Syrine Tlili

According to our database1, Syrine Tlili authored at least 10 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2014
Scalable Security Verification of Software at Compile Time.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

Smart Metering Privacy-preserving Techniques in a Nutshell.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2010
Security Evaluation and Hardening of Free and Open Source Software (FOSS).
ECEASST, 2010

2009
Interprocedural and Flow-Sensitive Type Analysis for Memory and Type Safety of C Code.
J. Autom. Reasoning, 2009

Verification of CERT Secure Coding Rules: Case Studies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Wireless Applications: Middleware Security.
Encyclopedia of Wireless and Mobile Communications, 2008

Model-Checking for Software Vulnerabilities Detection with Multi-Language Support.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

A Hybrid Approach for Safe Memory Management in C.
Proceedings of the Algebraic Methodology and Software Technology, 2008

A novel flow-sensitive type and effect analysis for securing C code.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Type and Effect Annotations for Safe Memory Access in C.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...