A fast automaton-based method for detecting anomalous program behaviors R Sekar, M Bendre, D Dhurjati, P Bollineni Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 144-155, 2000 | 923 | 2000 |
Automated test input generation for web applications G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura US Patent 8,302,080, 2012 | 345 | 2012 |
Backwards-compatible array bounds checking for C with very low overhead D Dhurjati, V Adve Proceedings of the 28th international conference on Software engineering …, 2006 | 285 | 2006 |
Dynamic test input generation for web applications G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura, Z Su Proceedings of the 2008 international symposium on Software testing and …, 2008 | 242 | 2008 |
Secure virtual architecture: A safe execution environment for commodity operating systems J Criswell, A Lenharth, D Dhurjati, V Adve Proceedings of twenty-first ACM SIGOPS symposium on Operating systems …, 2007 | 227 | 2007 |
SAFECode: Enforcing alias analysis for weakly typed languages D Dhurjati, S Kowshik, V Adve ACM SIGPLAN Notices 41 (6), 144-157, 2006 | 220 | 2006 |
Memory safety without runtime checks or garbage collection D Dhurjati, S Kowshik, V Adve, C Lattner Proceedings of the 2003 ACM SIGPLAN conference on language, compiler, and …, 2003 | 167 | 2003 |
Efficiently detecting all dangling pointer uses in production servers D Dhurjati, V Adve International Conference on Dependable Systems and Networks (DSN'06), 269-280, 2006 | 141 | 2006 |
Scaling up superoptimization PM Phothilimthana, A Thakur, R Bodik, D Dhurjati Proceedings of the Twenty-First International Conference on Architectural …, 2016 | 130 | 2016 |
Ensuring code safety without runtime checks for real-time control systems S Kowshik, D Dhurjati, V Adve Proceedings of the 2002 International Conference on Compilers, Architecture …, 2002 | 88 | 2002 |
Memory safety without garbage collection for embedded applications D Dhurjati, S Kowshik, V Adve, C Lattner ACM Transactions on Embedded Computing Systems (TECS) 4 (1), 73-111, 2005 | 71 | 2005 |
Data Protection Using Virtual Resource Views M Christodorescu, D Dhurjati, N Islam US Patent App. 15/076,936, 2017 | 48 | 2017 |
Path-sensitive dataflow analysis with iterative refinement D Dhurjati, M Das, Y Yang Static Analysis: 13th International Symposium, SAS 2006, Seoul, Korea …, 2006 | 43 | 2006 |
Method for test suite reduction through system call coverage criterion D Dhurjati, A Chander, H Inamura US Patent App. 12/204,654, 2009 | 37 | 2009 |
Energy-Efficient Run-Time Offloading of Dynamically Generated Code in Heterogenuous Multiprocessor Systems SAK Gathala, D Dhurjati, A Ermolinskiy, CA Vick US Patent App. 13/961,122, 2015 | 27 | 2015 |
Efficient directed acyclic graph pattern matching to enable code partitioning and execution on heterogeneous processor cores D Dhurjati, M Kim, CA Vick US Patent 9,201,659, 2015 | 23 | 2015 |
Formal specification and analysis of timing properties in software systems M AlTurki, D Dhurjati, D Yu, A Chander, H Inamura International Conference on Fundamental Approaches to Software Engineering …, 2009 | 22 | 2009 |
Greenthumb: Superoptimizer construction framework PM Phothilimthana, A Thakur, R Bodik, D Dhurjati Proceedings of the 25th International Conference on Compiler Construction …, 2016 | 19 | 2016 |
Optimal test input sequence generation for finite state models and pushdown systems A Chander, D Dhurjati, K Sen, D Yu 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 18 | 2011 |
Directed testing for property violations D Dhurjati, A Chander, H Inamura US Patent 8,468,499, 2013 | 15 | 2013 |