• Publications
  • Influence
Winnowing: local algorithms for document fingerprinting
TLDR
We introduce the class of local document fingerprinting algorithms, which seems to capture an essential property of any finger-printing technique guaranteed to detect copies. Expand
  • 982
  • 105
  • PDF
Scalable statistical bug isolation
TLDR
We present a statistical debugging algorithm that isolates bugs in programs containing multiple undiagnosed bugs and identifies predictors that correlate with program failure. Expand
  • 805
  • 84
  • PDF
Legion: Expressing locality and independence with logical regions
TLDR
We present Legion, a programming model and runtime system that dynamically extracts parallelism from Legion programs, using distributed, parallel scheduling algorithm that identifies both independent tasks and nested parallelism. Expand
  • 400
  • 45
  • PDF
Bug isolation via remote program sampling
TLDR
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program's user community that can be used to isolate bugs. Expand
  • 609
  • 44
  • PDF
Effective static race detection for Java
TLDR
We present a novel technique for static race detection in Java programs, comprised of a series of stages that employ a combination of static analyses to successively reduce the pairs of memory accesses potentially involved in a race. Expand
  • 514
  • 37
  • PDF
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
TLDR
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. Expand
  • 729
  • 36
  • PDF
Static Detection of Security Vulnerabilities in Scripting Languages
TLDR
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Expand
  • 397
  • 32
  • PDF
Titanium: A High-performance Java Dialect
TLDR
Titanium is a language and system for high-performance parallel scientific computing. Expand
  • 459
  • 31
  • PDF
Secure Information Flow as a Safety Problem
TLDR
This paper generalizes the self-compositional approach with a form of information downgrading recently proposed by Li and Zdancewic. Expand
  • 269
  • 28
  • PDF
Apposcopy: semantics-based detection of Android malware through static analysis
TLDR
We present Apposcopy, a new semantics-based approach for identifying a prevalent class of Android malware that steals private user information. Expand
  • 346
  • 26
  • PDF