default search action
Cristina Cifuentes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Cristina Cifuentes, François Gauthier, Behnaz Hassanshahi, Padmanabhan Krishnan, Davin McCall:
The role of program analysis in security vulnerability detection: Then and now. Comput. Secur. 135: 103463 (2023) - [j16]Padmanabhan Krishnan, Cristina Cifuentes, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Why Is Static Application Security Testing Hard to Learn? IEEE Secur. Priv. 21(5): 68-72 (2023) - [c41]Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali, James R. Wright, Cristina Cifuentes:
Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. ICSME 2023: 463-473 - 2022
- [j15]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [c40]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - 2021
- [i3]Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko:
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence. CoRR abs/2103.07012 (2021) - 2020
- [c39]Seok-Hee Hong, Peter Eades, Marnijati Torkel, Weidong Huang, Cristina Cifuentes:
Dynamic Graph Map Animation. PacificVis 2020: 1-6 - [i2]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020)
2010 – 2019
- 2019
- [c38]Cristina Cifuentes, Gavin M. Bierman:
What is a Secure Programming Language? SNAPL 2019: 3:1-3:15 - 2018
- [c37]Yang Zhao, Xingzhong Du, Paddy Krishnan, Cristina Cifuentes:
Buffer overflow detection for C programs is hard to learn. ISSTA/ECOOP Workshops 2018: 8-9 - 2017
- [c36]Timothy Chappell, Cristina Cifuentes, Padmanabhan Krishnan, Shlomo Geva:
Machine learning for finding bugs: An initial report. MaLTeSQuE 2017: 21-26 - [e1]Karim Ali, Cristina Cifuentes:
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2017, Barcelona, Spain, June 18, 2017. ACM 2017, ISBN 978-1-4503-5072-3 [contents] - 2015
- [c35]Cristina Cifuentes, Andrew Gross, Nathan Keynes:
Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform. SOAP@PLDI 2015: 7-12 - [c34]Nathan Hawes, Ben Barham, Cristina Cifuentes:
Frappé: Querying the Linux Kernel Dependency Graph. GRADES@SIGMOD/PODS 2015: 4:1-4:6 - 2014
- [c33]Manuel Valdiviezo, Cristina Cifuentes, Padmanabhan Krishnan:
A Method for Scalable and Precise Bug Finding Using Program Analysis and Model Checking. APLAS 2014: 196-215 - 2013
- [c32]Cristina Cifuentes, Nathan Keynes:
Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk). APLAS 2013: 172-175 - [c31]Kirsten Winter, Chenyi Zhang, Ian J. Hayes, Nathan Keynes, Cristina Cifuentes, Lian Li:
Path-Sensitive Data Flow Analysis Simplified. ICFEM 2013: 415-430 - [c30]Lian Li, Cristina Cifuentes, Nathan Keynes:
Precise and scalable context-sensitive pointer analysis via value flow graph. ISMM 2013: 85-96 - 2012
- [j14]Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo:
Transitioning Parfait into a Development Tool. IEEE Secur. Priv. 10(3): 16-23 (2012) - [j13]Cristina Cifuentes:
SIGPLAN treasurer's report. ACM SIGPLAN Notices 47(4a): 6 (2012) - 2011
- [c29]Lian Li, Cristina Cifuentes, Nathan Keynes:
Boosting the performance of flow-sensitive points-to analysis using value flow. SIGSOFT FSE 2011: 343-353 - [c28]Cristina Cifuentes, Nathan Keynes, Lian Li, Nathan Hawes, Manuel Valdiviezo, Andrew Browne, Jacob Zimmermann, Andrew Craik, Douglas Teoh, Christian Hoermann:
Static deep error checking in large system applications using parfait. SIGSOFT FSE 2011: 432-435 - 2010
- [c27]Lian Li, Cristina Cifuentes, Nathan Keynes:
Practical and effective symbolic analysis for buffer overflow detection. SIGSOFT FSE 2010: 317-326
2000 – 2009
- 2009
- [c26]Cristina Cifuentes, Nathan Keynes, Lian Li, Bernhard Scholz:
Program analysis for bug detection using parfait: invited talk. PEPM 2009: 7-8 - 2008
- [c25]Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. SCAM 2008: 25-34 - [c24]Cristina Cifuentes:
Parfait - A Scalable Bug Checker for C Code. SCAM 2008: 263-264 - [i1]Cristina Cifuentes, Bernhard Scholz:
Parfait - Designing a Scalable Bug Checker. Scalable Program Analysis 2008 - 2006
- [j12]David Ung, Cristina Cifuentes:
Dynamic binary translation using run-time feedbacks. Sci. Comput. Program. 60(2): 189-204 (2006) - [c23]Doug Simon, Cristina Cifuentes, Dave Cleal, John Daniels, Derek White:
JavaTM on the bare metal of wireless sensor devices: the squawk Java virtual machine. VEE 2006: 78-88 - 2005
- [c22]Doug Simon, Cristina Cifuentes:
The squawk virtual machine: Java on the bare metal. OOPSLA Companion 2005: 150-151 - 2004
- [c21]Michael Ball, Cristina Cifuentes, Deepankar Bairagi:
Partitioning of Code for a Massively Parallel Machine. IEEE PACT 2004: 225-236 - 2003
- [j11]Norman Ramsey, Cristina Cifuentes:
A transformational approach to binary translation of delayed branches. ACM Trans. Program. Lang. Syst. 25(2): 210-224 (2003) - 2002
- [c20]Jens Tröger, Cristina Cifuentes:
Analysis of Virtual Method Invocation for Binary Translation. WCRE 2002: 65- - 2001
- [j10]Cristina Cifuentes:
The Profession - Reverse Engineering and the Computing Profession. Computer 34(12): 166-168 (2001) - [j9]Cristina Cifuentes, Mike Van Emmerik:
Recovery of jump table case statements from binary code. Sci. Comput. Program. 40(2-3): 171-188 (2001) - [j8]David Ung, Cristina Cifuentes:
Optimising hot paths in a dynamic binary translator. SIGARCH Comput. Archit. News 29(1): 55-65 (2001) - [c19]Cristina Cifuentes, Trent Waddington, Mike Van Emmerik:
Computer Security Analysis through Decompilation and High-Level Debugging. WCRE 2001: 375-380 - 2000
- [j7]Cristina Cifuentes, Anne Fitzgerald:
The legal status of reverse engineering of computer software. Ann. Softw. Eng. 9: 337-351 (2000) - [j6]Cristina Cifuentes, Mike Van Emmerik:
UQBT: Adaptive Binary Translation at Low Cost. Computer 33(3): 60-66 (2000) - [c18]Cristina Cifuentes, Doug Simon:
Procedure Abstraction Recovery from Binary Code. CSMR 2000: 55-64 - [c17]David Ung, Cristina Cifuentes:
Machine-adaptable dynamic binary translation. Dynamo 2000: 41-51 - [c16]David Ung, Cristina Cifuentes:
Dynamic Re-engineering of Binary Code with Run-time Feedbacks. WCRE 2000: 2-10
1990 – 1999
- 1999
- [c15]Cristina Cifuentes, Mike Van Emmerik:
Recovery of Jump Table Case Statements from Binary Code. IWPC 1999: 192-199 - [c14]Cristina Cifuentes:
The Impact of Copyright on the Development of Cutting Edge Binary Reverse Engineering Technology. WCRE 1999: 66-76 - [c13]Cristina Cifuentes, Mike Van Emmerik, Norman Ramsey:
The Design of a Resourceable and Retargetable Binary Translator. WCRE 1999: 280-291 - 1998
- [c12]Cristina Cifuentes, Anne Fitzgerald:
Introducing a legal strand in the computer science curriculum. ACSE 1998: 19-26 - [c11]Cristina Cifuentes, Doug Simon, Antoine Fraboulet:
Assembly to High-Level Language Translation. ICSM 1998: 228-237 - [c10]Cristina Cifuentes, Shane Sendall:
Specifying the Semantics of Machine Instructions. IWPC 1998: 126-133 - 1997
- [j5]Cristina Cifuentes, Anne Fitzgerald:
Copyright in Shareware Programs Distributed on the Internet. Aust. Comput. J. 29(1): 24-30 (1997) - [c9]David Ung, Cristina Cifuentes:
SRL 3/4-A Simple Retargetable Loader. Australian Software Engineering Conference 1997: 60-69 - [c8]Cristina Cifuentes:
Software Patents. Australian Software Engineering Conference 1997: 111-112 - [c7]Cristina Cifuentes, Anne Fitzgerald:
Copyright in Shareware Software Distributed on the Internet - The Trumpet Winsock Case. ICSE 1997: 456-464 - [c6]Cristina Cifuentes, Antoine Fraboulet:
Intraprocedural Static Slicing of Binary Executables. ICSM 1997: 188- - 1996
- [j4]Cristina Cifuentes, Carmen Lockwood:
Introduction of a CASE tool to teach structured analysis. Comput. Educ. 27(3-4): 197-204 (1996) - [j3]Cristina Cifuentes, Anne Fitzgerald:
Australian Recommendations on Computer Software Protection. Comput. J. 39(7): 566-576 (1996) - [j2]Cristina Cifuentes:
Interprocedural data flow decompilation. J. Program. Lang. 4(2): 77-99 (1996) - [c5]Cristina Cifuentes, Barry Brannan:
Teaching C/C++ to computer science students with pascal programming experience. ACSE 1996: 189-196 - [c4]Cristina Cifuentes:
Structuring Decompiled Graphs. CC 1996: 91-105 - [c3]Cristina Cifuentes, Vishv M. Malhotra:
Binary Translation: Static, Dynamic, Retargetable? ICSM 1996: 340-349 - [c2]Cristina Cifuentes:
Partial Automation of an Integrated Reverse Engineering Environment of Binary Code. WCRE 1996: 50-56 - 1995
- [j1]Cristina Cifuentes, K. John Gough:
Decompilation of Binary Programs. Softw. Pract. Exp. 25(7): 811-829 (1995) - [c1]Cristina Cifuentes:
An Environment for the Reverse Engineering of Executable Programs. APSEC 1995: 410-419
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint