Alexander Jordan
Alexander Jordan
Oracle Labs
Dirección de correo verificada de oracle.com - Página principal
Título
Citado por
Citado por
Año
T-CREST: Time-predictable multi-core architecture for embedded systems
M Schoeberl, S Abbaspour, B Akesson, N Audsley, R Capasso, J Garside, ...
Journal of Systems Architecture 61 (9), 449-471, 2015
1692015
Combining string abstract domains for JavaScript analysis: an evaluation
R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2017
302017
Static analysis of worst-case stack cache behavior
A Jordan, F Brandner, M Schoeberl
Proceedings of the 21st International conference on Real-Time Networks and …, 2013
242013
Static profiling of the worst-case in real-time programs
F Brandner, S Hepp, A Jordan
Proceedings of the 20th International Conference on Real-Time and Network …, 2012
162012
Lazy spilling for a time-predictable stack cache: Implementation and analysis
S Abbaspour, A Jordan, F Brandner
14th International Workshop on Worst-Case Execution Time Analysis, 83-92, 2014
122014
A FFOGATO: runtime detection of injection attacks for Node. js
F Gauthier, B Hassanshahi, A Jordan
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018
112018
Criticality: static profiling for real-time programs
F Brandner, S Hepp, A Jordan
Real-Time Systems 50 (3), 377-410, 2014
92014
Reference Abstract Domains and Applications to String Analysis
R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ...
Fundamenta Informaticae 158 (4), 297-326, 2018
82018
IR-level versus machine-level if-conversion for predicated architectures
A Jordan, N Kim, A Krall
Proceedings of the 10th Workshop on Optimizations for DSP and Embedded …, 2013
82013
Automatic Modeling of Opaque Code for JavaScript Static Analysis
J Park, A Jordan, S Ryu
International Conference on Fundamental Approaches to Software Engineering …, 2019
62019
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
arXiv preprint arXiv:1810.12490, 2018
32018
Refinement of worst-case execution time bounds by graph pruning
F Brandner, A Jordan
Computer Languages, Systems & Structures 40 (3-4), 155-170, 2014
32014
Evaluating and estimating the WCET criticality metric
A Jordan
Proceedings of the 11th Workshop on Optimizations for DSP and Embedded …, 2014
32014
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
22019
Subgraph-Based Refinement of Worst-Case Execution Time Bounds
F Brandner, A Jordan
Tech. Rep. hal-00978015 (version 1), ENSTA, 2014
22014
IFDS Taint Analysis with Access Paths
N Allen, F Gauthier, A Jordan
arXiv preprint arXiv:2103.16240, 2021
2021
Staged dynamic taint flow inference
B Hassanshahi, H Lee, A Jordan, F Gauthier
US Patent 10,915,639, 2021
2021
Taint analysis with access paths
N Allen, F Gauthier, A Jordan
US Patent 10,789,362, 2020
2020
Trade-offs in managing risk and technical debt in industrial research labs: an experience report
F Gauthier, A Jordan, P Krishnan, B Hassanshahi, JG Süß, S Bae, H Lee
Proceedings of the 3rd International Conference on Technical Debt, 98-102, 2020
2020
Detecting malicious code embedded in documents
AW Jordan, F Gauthier
US Patent 10,657,252, 2020
2020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20