default search action
Cristina Cifuentes
- > Home > Persons > Cristina Cifuentes
Publications
- 2023
- [j17]Cristina Cifuentes, François Gauthier, Behnaz Hassanshahi, Padmanabhan Krishnan, Davin McCall:
The role of program analysis in security vulnerability detection: Then and now. Comput. Secur. 135: 103463 (2023) - [j16]Padmanabhan Krishnan, Cristina Cifuentes, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Why Is Static Application Security Testing Hard to Learn? IEEE Secur. Priv. 21(5): 68-72 (2023) - [c41]Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali, James R. Wright, Cristina Cifuentes:
Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. ICSME 2023: 463-473 - 2022
- [j15]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [c40]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - 2021
- [i3]Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko:
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence. CoRR abs/2103.07012 (2021) - 2020
- [i2]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020) - 2018
- [c37]Yang Zhao, Xingzhong Du, Paddy Krishnan, Cristina Cifuentes:
Buffer overflow detection for C programs is hard to learn. ISSTA/ECOOP Workshops 2018: 8-9 - 2017
- [c36]Timothy Chappell, Cristina Cifuentes, Padmanabhan Krishnan, Shlomo Geva:
Machine learning for finding bugs: An initial report. MaLTeSQuE@SANER 2017: 21-26 - [e1]Karim Ali, Cristina Cifuentes:
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2017, Barcelona, Spain, June 18, 2017. ACM 2017, ISBN 978-1-4503-5072-3 [contents] - 2015
- [c35]Cristina Cifuentes, Andrew Gross, Nathan Keynes:
Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform. SOAP@PLDI 2015: 7-12 - [c34]Nathan Hawes, Ben Barham, Cristina Cifuentes:
Frappé: Querying the Linux Kernel Dependency Graph. GRADES@SIGMOD/PODS 2015: 4:1-4:6 - 2014
- [c33]Manuel Valdiviezo, Cristina Cifuentes, Padmanabhan Krishnan:
A Method for Scalable and Precise Bug Finding Using Program Analysis and Model Checking. APLAS 2014: 196-215 - 2013
- [c32]Cristina Cifuentes, Nathan Keynes:
Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk). APLAS 2013: 172-175 - [c31]Kirsten Winter, Chenyi Zhang, Ian J. Hayes, Nathan Keynes, Cristina Cifuentes, Lian Li:
Path-Sensitive Data Flow Analysis Simplified. ICFEM 2013: 415-430 - [c30]Lian Li, Cristina Cifuentes, Nathan Keynes:
Precise and scalable context-sensitive pointer analysis via value flow graph. ISMM 2013: 85-96 - 2012
- [j14]Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo:
Transitioning Parfait into a Development Tool. IEEE Secur. Priv. 10(3): 16-23 (2012) - 2011
- [c29]Lian Li, Cristina Cifuentes, Nathan Keynes:
Boosting the performance of flow-sensitive points-to analysis using value flow. SIGSOFT FSE 2011: 343-353 - [c28]Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo, Andrew Browne, Jacob Zimmermann, Andrew Craik, Douglas Teoh, Christian Hoermann:
Static deep error checking in large system applications using parfait. SIGSOFT FSE 2011: 432-435 - 2010
- [c27]Lian Li, Cristina Cifuentes, Nathan Keynes:
Practical and effective symbolic analysis for buffer overflow detection. SIGSOFT FSE 2010: 317-326 - 2009
- [c26]Cristina Cifuentes, Nathan Keynes, Lian Li, Bernhard Scholz:
Program analysis for bug detection using parfait: invited talk. PEPM 2009: 7-8 - 2008
- [c25]Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. SCAM 2008: 25-34 - [i1]Cristina Cifuentes, Bernhard Scholz:
Parfait - Designing a Scalable Bug Checker. Scalable Program Analysis 2008
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint