Cristina Cifuentes

According to our database1, Cristina Cifuentes authored at least 60 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The role of program analysis in security vulnerability detection: Then and now.
Comput. Secur., December, 2023

Why Is Static Application Security Testing Hard to Learn?
IEEE Secur. Priv., 2023

Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

Industrial Strength Static Detection for Cryptographic API Misuses.
Proceedings of the IEEE Secure Development Conference, 2022

2021
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence.
CoRR, 2021

2020
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases.
CoRR, 2020

Dynamic Graph Map Animation.
Proceedings of the 2020 IEEE Pacific Visualization Symposium, 2020

2019
What is a Secure Programming Language?
Proceedings of the 3rd Summit on Advances in Programming Languages, 2019

2018
Buffer overflow detection for C programs is hard to learn.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

2017
Machine learning for finding bugs: An initial report.
Proceedings of the 2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation, 2017

2015
Frappé: Querying the Linux Kernel Dependency Graph.
Proceedings of the Third International Workshop on Graph Data Management Experiences and Systems, 2015

Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform.
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2015

2014
A Method for Scalable and Precise Bug Finding Using Program Analysis and Model Checking.
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014

2013
Precise and scalable context-sensitive pointer analysis via value flow graph.
Proceedings of the International Symposium on Memory Management, 2013

Path-Sensitive Data Flow Analysis Simplified.
Proceedings of the Formal Methods and Software Engineering, 2013

Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk).
Proceedings of the Programming Languages and Systems - 11th Asian Symposium, 2013

2012
SIGPLAN treasurer's report.
ACM SIGPLAN Notices, 2012

Transitioning Parfait into a Development Tool.
IEEE Secur. Priv., 2012

2011
Boosting the performance of flow-sensitive points-to analysis using value flow.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Static deep error checking in large system applications using parfait.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

2010
Practical and effective symbolic analysis for buffer overflow detection.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

2009
Program analysis for bug detection using parfait: invited talk.
Proceedings of the 2009 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, 2009

2008
User-Input Dependence Analysis via Graph Reachability.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Parfait - A Scalable Bug Checker for C Code.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Parfait - Designing a Scalable Bug Checker.
Proceedings of the Scalable Program Analysis, 13.04. - 18.04.2008, 2008

2006
Dynamic binary translation using run-time feedbacks.
Sci. Comput. Program., 2006

Java<sup>TM</sup> on the bare metal of wireless sensor devices: the squawk Java virtual machine.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

2005
The squawk virtual machine: Java on the bare metal.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

2004
Partitioning of Code for a Massively Parallel Machine.
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September, 2004

2003
A transformational approach to binary translation of delayed branches.
ACM Trans. Program. Lang. Syst., 2003

2002
Analysis of Virtual Method Invocation for Binary Translation.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002

2001
Optimising hot paths in a dynamic binary translator.
SIGARCH Comput. Archit. News, 2001

Recovery of jump table case statements from binary code.
Sci. Comput. Program., 2001

The Profession - Reverse Engineering and the Computing Profession.
Computer, 2001

Computer Security Analysis through Decompilation and High-Level Debugging.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

2000
UQBT: Adaptive Binary Translation at Low Cost.
Computer, 2000

The legal status of reverse engineering of computer software.
Ann. Softw. Eng., 2000

Dynamic Re-engineering of Binary Code with Run-time Feedbacks.
Proceedings of the Seventh Working Conference on Reverse Engineering, 2000

Machine-adaptable dynamic binary translation.
Proceedings of ACM SIGPLAN Workshop on Dynamic and Adaptive Compilation and Optimization (Dynamo 2000), 2000

Procedure Abstraction Recovery from Binary Code.
Proceedings of the 4th European Conference on Software Maintenance and Reengineering, 2000

1999
The Design of a Resourceable and Retargetable Binary Translator.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

The Impact of Copyright on the Development of Cutting Edge Binary Reverse Engineering Technology.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

1998
Specifying the Semantics of Machine Instructions.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998

Assembly to High-Level Language Translation.
Proceedings of the 1998 International Conference on Software Maintenance, 1998

Introducing a legal strand in the computer science curriculum.
Proceedings of the ACM SIGCSE 3rd Australasian Conference on Computer Science Education, 1998

1997
Copyright in Shareware Programs Distributed on the Internet.
Aust. Comput. J., 1997

Intraprocedural Static Slicing of Binary Executables.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997

Copyright in Shareware Software Distributed on the Internet - The Trumpet Winsock Case.
Proceedings of the Pulling Together, 1997

SRL 3/4-A Simple Retargetable Loader.
Proceedings of the 1997 Australian Software Engineering Conference (ASWEC '97), 28 September, 1997

Software Patents.
Proceedings of the 1997 Australian Software Engineering Conference (ASWEC '97), 28 September, 1997

1996
Interprocedural data flow decompilation.
J. Program. Lang., 1996

Australian Recommendations on Computer Software Protection.
Comput. J., 1996

Introduction of a CASE tool to teach structured analysis.
Comput. Educ., 1996

Partial Automation of an Integrated Reverse Engineering Environment of Binary Code.
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996

Binary Translation: Static, Dynamic, Retargetable?
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996

Structuring Decompiled Graphs.
Proceedings of the Compiler Construction, 6th International Conference, 1996

Teaching C/C++ to computer science students with pascal programming experience.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996

1995
Decompilation of Binary Programs.
Softw. Pract. Exp., 1995

An Environment for the Reverse Engineering of Executable Programs.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995


  Loading...