BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Czech Republic
1 × India
1 × Ireland
1 × South Africa
2 × Canada
2 × Italy
2 × United Kingdom
8 × USA
Collaborated with:
O.Tripp P.Ferrara J.Dolby L.Koved S.J.Fink S.Artzi P.Centonze S.Guarnieri T.Tateishi F.Tip R.J.Flynn E.Yahav M.Sridharan R.Hay R.Berg A.Kershenbaum L.Brutschy A.Cortesi S.Shoham S.Fink G.Naumovich V.C.Sreedhar P.Cousot R.Cousot E.Geay B.G.Ryder O.Weisman A.Aydin D.Piorkowski S.Teilhet X.Zhang S.Weber T.Jaeger G.Marceau L.Zeng
Talks about:
analysi (11) applic (6) web (6) access (4) secur (4) base (4) polici (3) taint (3) dynam (3) javascript (2)

Person: Marco Pistoia

DBLP DBLP: Pistoia:Marco

Contributed to:

ECOOP 20152015
ISSTA 20152015
OOPSLA 20152015
VMCAI 20152015
ISSTA 20142014
FASE 20132013
ISSTA 20112011
OOPSLA 20112011
ICSE 20102010
ISSTA 20102010
ICSE 20092009
PLDI 20092009
VMCAI 20082008
ICSE 20072007
ISSTA 20072007
ISSTA 20062006
ECOOP 20052005
OOPSLA 20022002
FASE 20172017

Wrote 21 papers:

ECOOP-2015-CentonzePT #analysis
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ISSTA-2015-HayTP #android #communication #detection
Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
OOPSLA-2015-BrutschyFTP #named #resource management
ShamDroid: gracefully degrading functionality in the presence of limited resource access (LB, PF, OT, MP), pp. 316–331.
VMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
FASE-2013-TrippPCCG #analysis #named #scalability #security #web
Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
ISSTA-2011-GuarnieriPTDTB #javascript #web
Saving the world wide web from vulnerable JavaScript (SG, MP, OT, JD, ST, RB), pp. 177–187.
ISSTA-2011-TateishiPT #analysis #higher-order #logic #monad #string
Path- and index-sensitive string analysis based on monadic second-order logic (TT, MP, OT), pp. 166–176.
OOPSLA-2011-SridharanAPGTB #analysis #named #web
F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
ICSE-2010-ArtziDTP #fault #locality #web
Practical fault localization for dynamic web applications (SA, JD, FT, MP), pp. 265–274.
ISSTA-2010-ArtziDTP #effectiveness #fault #generative #locality #testing
Directed test generation for effective fault localization (SA, JD, FT, MP), pp. 49–60.
ICSE-2009-GeayPTRD #analysis #composition #precise #string
Modular string-sensitive permission analysis with demand-driven precision (EG, MP, TT, BGR, JD), pp. 177–187.
PLDI-2009-TrippPFSW #analysis #effectiveness #named #web
TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
VMCAI-2008-Pistoia #program analysis #programming language #security
Program Analysis and Programming Languages for Security (MP), p. 7.
ICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
ISSTA-2007-ShohamYFP #abstraction #mining #specification #using
Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
ISSTA-2006-CentonzeNFP #consistency #data access #validation
Role-Based access control consistency validation (PC, GN, SJF, MP), pp. 121–132.
ISSTA-2006-ZhangKPWJMZ #analysis
The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
ECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
OOPSLA-2002-KovedPK #analysis #java
Access rights analysis for Java (LK, MP, AK), pp. 359–372.
FASE-2017-AydinPTFP #mobile #policy #privacy #visual notation
Visual Configuration of Mobile Privacy Policies (AA, DP, OT, PF, MP), pp. 338–355.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.