1JUNFENG YANG,CAN SAR,DAWSON ENGLER.eXplode:a Lightweight,General System for Finding Serious Storage System Errors[].Proceedings of the USENIX Symposium on Operating Systems Design and Imple-mentation(OSDI).2006
2BARBARA G RYDER,WILLIAM A.LANDI,PHILIP A.STOCKS,SEAN ZHANG,RITA ALTUCHER.A schema for interprocedural modification side-effect analysis with pointer aliasing[].ACM TransProgramLangSyst.2001
3PHILIP A STOCKS,BARBARA G.RYDER,WILLIAM A.LANDI,SEAN ZHANG.Comparing flow and context sensitivity on the modification-side-effects problem[].ISSTA‘:Proceedings of theACM SIGSOFT in-ter-national symposium on Software testing and analysis.1998
4.DTS-A Software Defects Testing System SCAM[].the IEEEth Interna-tional Working Conference on Source Code Analysis and Manipulation.2008
5K.Ashcraft,,D.Engler.Using Programmer-Written Compiler Extensions to Catch Security Holes[].ProcIEEE SympSecuri-ty and Privacy.2002
6Landi W,Ryder B G,Zhang S.Interprocedural modification side effect analysis with pointer aliasing[].In SIGPLAN Symposium on Programming Language Design and Implementation June.1993
7Mohammad Ali Ghodrat,Tony Givargis,Alexandru Nicolau.Expression equivalence checking using interval analysis[].IEEE TransVLSI Syst.2006
8Minh Ngoc Ngo,Hee Beng,Kuan Tan.Detecting Large Number of Infeasible Paths through Recognizing Their Patterns[].Foundations of Software EngineeringProceedings of theth Joint Meeting of the European Software Engineering Conference and the ACMSIGSOFTSymposium on the Foundations of Software Engi-neeringScaling-up Static Analysis.2007