Marco Pistoia
Marco Pistoia
JPMorgan Chase & Co.
Verified email at jpmchase.com - Homepage
Title
Cited by
Cited by
Year
TAJ: effective taint analysis of web applications
O Tripp, M Pistoia, SJ Fink, M Sridharan, O Weisman
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Languages …, 2009
3682009
Static specification mining using automata-based abstractions
S Shoham, E Yahav, SJ Fink, M Pistoia
IEEE Transactions on Software Engineering 34 (5), 651-666, 2008
2272008
Directed test generation for effective fault localization
S Artzi, J Dolby, F Tip, M Pistoia
Proceedings of the 19th international symposium on Software testing and …, 2010
1572010
System and method for supporting digital rights management in an enhanced Java™ 2 runtime environment
L Koved, MM Mourad, JP Munson, G Pacifici, M Pistoia, AS Youssef
US Patent 7,308,717, 2007
1462007
Saving the world wide web from vulnerable JavaScript
S Guarnieri, M Pistoia, O Tripp, J Dolby, S Teilhet, R Berg
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
1432011
Access rights analysis for Java
L Koved, M Pistoia, A Kershenbaum
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented …, 2002
1342002
Qiskit: An open-source framework for quantum computing
G Aleksandrowicz, T Alexander, P Barkoutsos, L Bello, Y Ben-Haim, ...
Accessed on: Mar 16, 2019
130*2019
Method, system and computer program product for enforcing privacy policies
L Koved, M Pistoia
US Patent 7,877,812, 2011
1302011
Andromeda: Accurate and Scalable Security Analysis of Web Applications
O Tripp, M Pistoia, P Cousot, R Cousot, S Guarnieri
International Conference on Fundamental Approaches to Software Engineering …, 2013
1262013
Software verification system, method and computer program element
PH Abbott, L Koved, AJ Nadalin, M Pistoia
US Patent 7,496,757, 2009
962009
Practical fault localization for dynamic web applications
S Artzi, J Dolby, F Tip, M Pistoia
2010 ACM/IEEE 32nd International Conference on Software Engineering 1, 265-274, 2010
952010
Automatic detection of inter-application permission leaks in Android applications
D Sbīrlea, MG Burke, S Guarnieri, M Pistoia, V Sarkar
IBM Journal of Research and Development 57 (6), 10: 1-10: 12, 2013
892013
A survey of static analysis methods for identifying security vulnerabilities in software systems
M Pistoia, S Chandra, SJ Fink, E Yahav
IBM Systems Journal 46 (2), 265-288, 2007
862007
F4F: taint analysis of framework-based web applications
M Sridharan, S Artzi, M Pistoia, S Guarnieri, O Tripp, R Berg
Proceedings of the 2011 ACM international conference on Object oriented …, 2011
852011
Transparent digital rights management for extendible content viewers
MM Mourad, JP Munson, T Nadeem, G Pacifici, M Pistoia, AS Youssef
US Patent 7,171,558, 2007
852007
Path-and index-sensitive string analysis based on monadic second-order logic
T Tateishi, M Pistoia, O Tripp
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (4), 1-33, 2013
812013
Interprocedural analysis for privileged code placement and tainted variable detection
M Pistoia, RJ Flynn, L Koved, VC Sreedhar
European Conference on Object-Oriented Programming, 362-386, 2005
792005
Static analysis based error reduction for software applications
B Alpern, R Johnson, A Kershenbaum, L Koved, G Leeman, M Pistoia, ...
US Patent App. 10/620,078, 2005
792005
Beyond stack inspection: A unified access-control and information-flow security model
M Pistoia, A Banerjee, DA Naumann
2007 IEEE Symposium on Security and Privacy (SP'07), 149-163, 2007
682007
Java 2 network security
M Pistoia, D Gupta, M Nagnur, A Ramani, DF Reller
Prentice Hall 1 (1), 1999
661999
The system can't perform the operation now. Try again later.
Articles 1–20