Publications
GrammaTech Research
GrammaTech is a spin-off from Cornell University, and for over three decades has fostered a culture of creative thinking, cutting edge research, and technology development. Check out some of our published papers below.
-
Software Transformation: Applications, Tools, Challenges, and Program Representation
Authors:Dave MelskiEric SchulteMichael McDougallWorkshop on Forming an Ecosystem Around Software Transformation (FEAST)
|
-
Polymorphic type inference for machine code
Authors:Alexey LoginovDavid CokMatthew NoonanProceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI
|
-
Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair
Authors:Eric M. SchulteStephanie ForrestWestley WeimerGenetic and Evolutionary Computation Conference, GECCO
|
-
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery
Authors:Alexey LoginovDavid MelskiDenis GopanDimitri NaydichDucson NguyenEvan Driscoll37th IEEE/ACM International Conference on Software Engineering, ICSE
|
-
Exploiting and Protecting Dynamic Code Generation
Authors:Chao ZhangChengyu SongDavid MelskiTielei WangWenke Lee2nd Annual Network and Distributed System Security Symposium, NDSS
|
-
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing
Authors:Anh Nguyen-TuongDavid HydeDavid MelskiJack W. DavidsonJason HiserJohn C. KnightMichele CoNathan KennedyWilliam EllaTenth European Dependable Computing Conference
|
-
Preventing Exploits Against Software of Uncertain Provenance
Authors:David MelskiHigh Confidence Software and Systems Conference
|
-
PEASOUP: preventing exploits against software of uncertain provenance (position paper)
Authors:Anh Nguyen-TuongBrian MastropietroChengyu SongDavid CokDavid HydeDavid MelskiDenis GopanJack W. DavidsonJason D. HiserJohn C. KnightMichele CoThomas BracewellWenke LeeProceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS
|
-
Finite differencing of logical formulas for static analysis
Authors:Alexey LoginovMooly SagivThomas W. RepsACM Transactions on Programming Languages and Systems (TOPLAS), Volume 32, Issue 6
|
-
Analysis Techniques for Information Security
Authors:Anupam DattaDavid MelskiNinghui LiSomesh JhaThomas W. RepsAnalysis Techniques for Information Security
|
-
A relational approach to interprocedural shape analysis
Authors:Alexey LoginovBertrand JeannetMooly SagivThomas W. RepsACM Transactions on Programming Languages and Systems (TOPLAS), Volume 32, Issue 2
|