Publications
GrammaTech Research
GrammaTech is a spin-off from Cornell University, and for over three decades has fostered a culture of creative thinking, cutting edge research, and technology development. Check out some of our published papers below.
Preventing Exploits Against Software of Uncertain Provenance
Authors:David MelskiHigh Confidence Software and Systems Conference
|
PEASOUP: preventing exploits against software of uncertain provenance (position paper)
Authors:Anh Nguyen-TuongBrian MastropietroChengyu SongDavid CokDavid HydeDavid MelskiDenis GopanJack W. DavidsonJason D. HiserJohn C. KnightMichele CoThomas BracewellWenke LeeProceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS
|
Finite differencing of logical formulas for static analysis
Authors:Alexey LoginovMooly SagivThomas W. RepsACM Transactions on Programming Languages and Systems (TOPLAS), Volume 32, Issue 6
|
Analysis Techniques for Information Security
Authors:Anupam DattaDavid MelskiNinghui LiSomesh JhaThomas W. RepsAnalysis Techniques for Information Security
|
A relational approach to interprocedural shape analysis
Authors:Alexey LoginovBertrand JeannetMooly SagivThomas W. RepsACM Transactions on Programming Languages and Systems (TOPLAS), Volume 32, Issue 2
|
Guided Static Analysis
Authors:Denis GopanThomas W. Reps14th International Symposium, SAS
|
WYSINWYX: What You See Is Not What You eXecute
Authors:David MelskiGogul BalakrishnanThomas W. RepsTim TeitelbaumVerified Software: Theories, Tools, Experiments, First IFIP TC 2/WG 2.3 Conference, VSTTE
|
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++
Authors:Akash LalChi-Hua ChenDavid MelskiGogul BalakrishnanJunghee LimNicholas KiddRadu GruianSuan Hsi YongThomas W. RepsTim TeitelbaumComputer Aided Verification, 17th International Conference, CAV
|
Weighted pushdown systems and their application to interprocedural dataflow analysis
Authors:David MelskiSomesh JhaStefan SchwoonThomas W. RepsScience of Computer Programming Volume 58, Issues 1–2
|
Buffer overrun detection using linear programming and static analysis
Authors:David ChandlerDavid MelskiDavid VitekSomesh JhaVinod GanapathyProceedings of the 10th ACM Conference on Computer and Communications Security, CCS
|
The Interprocedural Express-Lane Transformation
Authors:David MelskiThomas W. RepsCompiler Construction, 12th International Conference, CC 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS
|