Andromeda: Accurate and Scalable Security Analysis of Web Applications

O Tripp, M Pistoia, P Cousot, R Cousot… - … 2013, Held as Part of the …, 2013 - Springer
Security auditing of industry-scale software systems mandates automation. Static taint
analysis enables deep and exhaustive tracking of suspicious data flows for detection of …

[PDF][PDF] Differential Datalog.

L Ryzhyk, M Budiu - Datalog, 2019 - budiu.info
Many real-world applications based on deductive databases require incrementally updating
output relations (tables) in response to changes to input relations. To make such …

Declarative continuous reasoning in the cloud-IoT continuum

S Forti, G Bisicchia, A Brogi - Journal of Logic and Computation, 2022 - academic.oup.com
Develo** and releasing multiservice applications rely upon a pipeline of automation tools
known as Continuous Integration/Continuous Deployment. Among those tools, continuous …

Incremental algorithms for inter-procedural analysis of safety properties

CL Conway, KS Namjoshi, D Dams… - … Aided Verification: 17th …, 2005 - Springer
Automaton-based static program analysis has proved to be an effective tool for bug finding.
Current tools generally re-analyze a program from scratch in response to a change in the …

Incremental and demand-driven points-to analysis using logic programming

D Saha, CR Ramakrishnan - Proceedings of the 7th ACM SIGPLAN …, 2005 - dl.acm.org
Several program analysis problems can be cast elegantly as a logic program. In this paper
we show how recently-developed techniques for incremental evaluation of logic programs …

From clarity to efficiency for distributed algorithms

YA Liu, SD Stoller, B Lin, M Gorbovitski - Proceedings of the ACM …, 2012 - dl.acm.org
This paper describes a very high-level language for clear description of distributed
algorithms and optimizations necessary for generating efficient implementations. The …

Efficient verification of railway infrastructure designs against standard regulations

B Luteberget, C Johansen - Formal Methods in System Design, 2018 - Springer
In designing safety-critical infrastructures sa railway systems, engineers often have to deal
with complex and large-scale designs. Formal methods can play an important role in hel** …

Extending logical attack graphs for efficient vulnerability analysis

D Saha - Proceedings of the 15th ACM conference on Computer …, 2008 - dl.acm.org
Attack graph illustrates all possible multi-stage, multi-host attacks in an enterprise network
and is essential for vulnerability analysis tools. Recently, researchers have addressed the …

From clarity to efficiency for distributed algorithms

YA Liu, SD Stoller, B Lin - ACM Transactions on Programming …, 2017 - dl.acm.org
This article describes a very high-level language for clear description of distributed
algorithms and optimizations necessary for generating efficient implementations. The …

Integrating logic rules with everything else, seamlessly

YA Liu, SD Stoller, Y Tong, B Lin - Theory and Practice of Logic …, 2023 - cambridge.org
This paper presents a language, Alda, that supports all of logic rules, sets, functions,
updates, and objects as seamlessly integrated built-ins. The key idea is to support …