Karim Ali

According to our database1, Karim Ali authored at least 28 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Debugging Static Analysis.
IEEE Trans. Software Eng., 2020

On the time-based conclusion stability of cross-project defect prediction models.
Empir. Softw. Eng., 2020

Game Theoretic Malware Detection.
CoRR, 2020

SWAN: a static analysis framework for swift.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

CogniCrypt<sub><i>GEN</i></sub>: generating code for the secure usage of crypto APIs.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020

2019
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.
Proc. ACM Program. Lang., 2019

On the Time-Based Conclusion Stability of Software Defect Prediction Models.
CoRR, 2019

What do developers know about machine learning: a study of ML discussions on StackOverflow.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Toward an Analytical Performance Model to Select between GPU and CPU Execution.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

2018
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact).
Dagstuhl Artifacts Ser., 2018

VISUFLOW: a debugging environment for static analyses.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018

2017
Lifting the curse of stringly-typed code.
PeerJ Prepr., 2017

IDE<sup><i>al</i></sup>: efficient and precise alias-aware dataflow analysis.
Proc. ACM Program. Lang., 2017

CrySL: Validating Correct Usage of Cryptographic APIs.
CoRR, 2017

Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

Compiler-driven performance.
Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, 2017

2016
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact).
Dagstuhl Artifacts Ser., 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.
Proceedings of the 30th European Conference on Object-Oriented Programming, 2016

2015
Type-Based Call Graph Construction Algorithms for Scala.
ACM Trans. Softw. Eng. Methodol., 2015

Towards secure integration of cryptographic software.
Proceedings of the 2015 ACM International Symposium on New Ideas, 2015

2014
The Separate Compilation Assumption.
PhD thesis, 2014

Constructing Call Graphs of Scala Programs.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

2013
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the ECOOP 2013 - Object-Oriented Programming, 2013

2012
Application-Only Call Graph Construction.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012


  Loading...