dblp.uni-trier.dewww.uni-trier.de

Dawson R. Engler Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2008
55EEDawson R. Engler: Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems. FM 2008: 33
54EECristian Cadar, Daniel Dunbar, Dawson R. Engler: KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI 2008: 209-224
53EEPeter Boonstoppel, Cristian Cadar, Dawson R. Engler: RWset: Attacking Path Explosion in Constraint-Based Test Generation. TACAS 2008: 351-366
52EECristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler: EXE: Automatically Generating Inputs of Death. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
2007
51EETed Kremenek, Andrew Y. Ng, Dawson R. Engler: A Factor Graph Model for Software Bug Finding. IJCAI 2007: 2510-2516
50EEDawson R. Engler, Daniel Dunbar: Under-constrained execution: making automatic code destruction easy and scalable. ISSTA 2007: 1-4
2006
49EECristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler: EXE: automatically generating inputs of death. ACM Conference on Computer and Communications Security 2006: 322-335
48EEJunfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler: Automatically Generating Malicious Disks using Symbolic Execution. IEEE Symposium on Security and Privacy 2006: 243-257
47EEJunfeng Yang, Can Sar, Dawson R. Engler: EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. OSDI 2006: 131-146
46EETed Kremenek, Paul Twohey, Godmar Back, Andrew Y. Ng, Dawson R. Engler: From Uncertainty to Belief: Inferring the Specification Within. OSDI 2006: 161-176
45EEJunfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi: Using model checking to find serious file system errors. ACM Trans. Comput. Syst. 24(4): 393-423 (2006)
2005
44EEDawson R. Engler: Static Analysis Versus Model Checking for Bug Finding. CONCUR 2005: 1
43EECristian Cadar, Dawson R. Engler: Execution Generated Test Cases: How to Make Systems Code Crash Itself. SPIN 2005: 2-23
2004
42EEMadanlal Musuvathi, Dawson R. Engler: Model Checking Large Network Protocol Implementations. NSDI 2004: 155-168
41EEJunfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi: Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). OSDI 2004: 273-288
40EETed Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler: Correlation exploitation in error ranking. SIGSOFT FSE 2004: 83-93
39EEDawson R. Engler, Madanlal Musuvathi: Static Analysis versus Software Model Checking for Bug Finding. VMCAI 2004: 191-210
2003
38EEJunfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler: MECA: an extensible, expressive system and language for statically checking security properties. ACM Conference on Computer and Communications Security 2003: 321-334
37EEYichen Xie, Andy Chou, Dawson R. Engler: ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. ESEC / SIGSOFT FSE 2003: 327-336
36EETed Kremenek, Dawson R. Engler: Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. SAS 2003: 295-315
35EEDawson R. Engler, Ken Ashcraft: RacerX: effective, static detection of race conditions and deadlocks. SOSP 2003: 237-252
34EESeth Hallem, David Y. W. Park, Dawson R. Engler: Uprooting Software Defects at the Source. ACM Queue 1(8): 64-71 (2003)
33EEMadanlal Musuvathi, Dawson R. Engler: Some Lessons from Using Static Analysis and Software Model Checking for Bug Finding. Electr. Notes Theor. Comput. Sci. 89(3): (2003)
32EEYichen Xie, Dawson R. Engler: Using Redundancies to Find Errors. IEEE Trans. Software Eng. 29(10): 915-928 (2003)
2002
31EEMadanlal Musuvathi, Andy Chou, David L. Dill, Dawson R. Engler: Model checking system software with CMC. ACM SIGOPS European Workshop 2002: 219-222
30EEKen Ashcraft, Dawson R. Engler: Using Programmer-Written Compiler Extensions to Catch Security Holes. IEEE Symposium on Security and Privacy 2002: 143-159
29EEMadanlal Musuvathi, David Y. W. Park, Andy Chou, Dawson R. Engler, David L. Dill: CMC: A Pragmatic Approach to Model Checking Real Code. OSDI 2002
28EEBenjamin Chelf, Dawson R. Engler, Seth Hallem: How to write system-specific, static checkers in metal. PASTE 2002: 51-60
27EESeth Hallem, Benjamin Chelf, Yichen Xie, Dawson R. Engler: A System and Language for Building System-Specific, Static Analyses. PLDI 2002: 69-82
26EEDawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner: Cool security trends. SACMAT 2002: 53
25EEYichen Xie, Dawson R. Engler: Using redundancies to find errors. SIGSOFT FSE 2002: 51-60
24EEGregory R. Ganger, Dawson R. Engler, M. Frans Kaashoek, Héctor M. Briceño, Russell Hunt, Thomas Pinckney: Fast and flexible application-level networking on exokernel systems. ACM Trans. Comput. Syst. 20(1): 49-83 (2002)
2001
23EEDavid Lie, Andy Chou, Dawson R. Engler, David L. Dill: A simple method for extracting models for protocol code. ISCA 2001: 192-203
22EEDawson R. Engler, David Yu Chen, Andy Chou: Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code. SOSP 2001: 57-72
21EEAndy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, Dawson R. Engler: An Empirical Study of Operating System Errors. SOSP 2001: 73-88
20EEWilson C. Hsieh, Dawson R. Engler, Godmar Back: Reverse-Engineering Instruction Encodings. USENIX Annual Technical Conference, General Track 2001: 133-145
2000
19EEAndy Chou, Benjamin Chelf, Dawson R. Engler, Mark Heinrich: Using Meta-level Compilation to Check FLASH Protocol Code. ASPLOS 2000: 59-70
18EEDawson R. Engler, Wilson C. Hsieh: Derive: a tool that automatically reverse-engineers instruction encodings. Dynamo 2000: 12-22
17 Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem: Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. OSDI 2000: 1-16
1999
16EEMassimiliano Poletto, Wilson C. Hsieh, Dawson R. Engler, M. Frans Kaashoek: 'C and tcc: A Language and Compiler for Dynamic Code Generation. ACM Trans. Program. Lang. Syst. 21(2): 324-369 (1999)
15EEDawson R. Engler: Interface Compilation: Steps Toward Compiling Program Interfaces as Languages. IEEE Trans. Software Eng. 25(3): 387-400 (1999)
1997
14EEDawson R. Engler: Incorporating Application Semantics and Control into Compilation. DSL 1997
13 Massimiliano Poletto, Dawson R. Engler, M. Frans Kaashoek: tcc: A System for Fast, Flexible, and High-level Dynamic Code Generation. PLDI 1997: 109-121
12 M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, Kenneth Mackenzie: Application Performance and Flexibility on Exokernel Systems. SOSP 1997: 52-65
11EEDeborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek: ASHs application-specific handlers for high-performance messaging. IEEE/ACM Trans. Netw. 5(4): 460-474 (1997)
1996
10EEM. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Deborah A. Wallach: Server operating systems. ACM SIGOPS European Workshop 1996: 141-148
9 Dawson R. Engler: VCODE: a Retargetable, Extensible, Very Fast Dynamic Code Generation System. PLDI 1996: 160-170
8EEDawson R. Engler, Wilson C. Hsieh, M. Frans Kaashoek: `C: A Language for High-Level, Efficient, and Machine-Independent Dynamic Code Generation. POPL 1996: 131-144
7EEDeborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek: ASHs: Application-Specific Handlers for High-Performance Messaging. SIGCOMM 1996: 40-52
6EEDawson R. Engler, M. Frans Kaashoek: DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation. SIGCOMM 1996: 53-59
1995
5 Dawson R. Engler, M. Frans Kaashoek, James O'Toole: Exokernel: An Operating System Architecture for Application-Level Resource Management. SOSP 1995: 251-266
4 Dawson R. Engler, M. Frans Kaashoek, James O'Toole: The Operating System Kernel as a Secure Programmable Machine. Operating Systems Review 29(1): 78-82 (1995)
1994
3 Dawson R. Engler, M. Frans Kaashoek, James O'Toole: The Operating System Kernel as a Secure Programmable Machine. ACM SIGOPS European Workshop 1994: 62-67
2 Dawson R. Engler, Todd A. Proebsting: DCG: An Efficient, Retargetable Dynamic Code Generation System. ASPLOS 1994: 263-272
1 Dawson R. Engler, M. Frans Kaashoek, James O'Toole: The Exokernel Approach to Operating System Extensibility (Panel Statement). OSDI 1994: 198

Coauthor Index

1Ken Ashcraft [30] [35] [40]
2Godmar Back [20] [46]
3Peter Boonstoppel [53]
4Héctor M. Briceño [12] [24]
5Cristian Cadar [43] [48] [49] [52] [53] [54]
6Benjamin Chelf [17] [19] [21] [27] [28]
7David Yu Chen [22]
8Andy Chou [17] [19] [21] [22] [23] [29] [31] [37]
9David L. Dill [23] [29] [31] [49] [52]
10Daniel Dunbar [50] [54]
11Vijay Ganesh [49] [52]
12Gregory R. Ganger [10] [12] [24]
13Robert Grimm [12]
14Seth Hallem [17] [21] [27] [28] [34]
15Mark Heinrich [19]
16Wilson C. Hsieh [8] [16] [18] [20]
17Russell Hunt [12] [24]
18Cynthia E. Irvine [26]
19Trent Jaeger [26]
20John Jannotti [12]
21M. Frans Kaashoek [1] [3] [4] [5] [6] [7] [8] [10] [11] [12] [13] [16] [24]
22Ted Kremenek [36] [38] [40] [46] [51]
23David Lie [23]
24Kenneth Mackenzie [12]
25David Mazières [12]
26Madanlal Musuvathi [29] [31] [33] [39] [41] [42] [45]
27Andrew Y. Ng [46] [51]
28James O'Toole [1] [3] [4] [5]
29David Y. W. Park [29] [34]
30Peter M. Pawlowski [49] [52]
31Thomas Pinckney [12] [24]
32Massimiliano Poletto [13] [16]
33Todd A. Proebsting [2]
34Can Sar [47] [48]
35Paul Twohey [41] [45] [46] [48]
36David Wagner [26]
37Deborah A. Wallach [7] [10] [11]
38Yichen Xie [25] [27] [32] [37] [38]
39Junfeng Yang [21] [38] [40] [41] [45] [47] [48]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)