Oukseh Lee
Oukseh Lee
Codemind Coporation
Verified email at codemind.co.kr
Title
Cited by
Cited by
Year
Scalable shape analysis for systems code
H Yang, O Lee, J Berdine, C Calcagno, B Cook, D Distefano, P O’Hearn
International Conference on Computer Aided Verification, 385-398, 2008
3032008
Proofs about a folklore let-polymorphic type inference algorithm
O Lee, K Yi
ACM Transactions on Programming Languages and Systems (TOPLAS) 20 (4), 707-723, 1998
1381998
Automatic verification of pointer programs using grammar-based shape analysis
O Lee, H Yang, K Yi
European Symposium on Programming, 124-140, 2005
1012005
A practical string analyzer by the widening approach
TH Choi, O Lee, H Kim, KG Doh
Asian Symposium on Programming Languages and Systems, 374-388, 2006
562006
Program analysis for overlaid data structures
O Lee, H Yang, R Petersen
International Conference on Computer Aided Verification, 592-608, 2011
432011
On scalable shape analysis
H Yang, O Lee, C Calcagno, D Distefano, P O’Hearn
Technical report RR-07-10, Queen Mary, University of London, 2007
122007
Universal string analyzer and method thereof
K Doh, O Lee, T Choi, B Whang, J Chu, S Yoo, S Hong
US Patent App. 11/393,362, 2006
112006
Applying dataflow analysis to detecting software vulnerability
H Kim, TH Choi, SC Jung, HC Kim, O Lee, KG Doh
2008 10th International Conference on Advanced Communication Technology 1 …, 2008
102008
Inserting safe memory reuse commands into ML-like programs
O Lee, H Yang, K Yi
International Static Analysis Symposium, 171-188, 2003
102003
Inserting safe memory reuse commands into ML-like programs
O Lee, H Yang, K Yi
International Static Analysis Symposium, 171-188, 2003
102003
A generalized let-polymorphic type inference algorithm
O Lee, K Yi
Technical Memorandum ROPAS-2000-5, Research on Program Analysis System …, 2000
102000
Proofs of a set of hybrid let-polymorphic type inference algorithms
H Eo, O Lee, K Yi
New Generation Computing 22 (1), 1-36, 2004
92004
A proof method for the correctness of modularized 0CFA
O Lee, K Yi, Y Paek
Information Processing Letters 81 (4), 179-185, 2002
92002
Experiments on the Effectiveness of an Automatic Insertion of Memory Reuses into ML-like Programs
O Lee, K Yi
Proceedings of the 4th international symposium on Memory management, 97-107, 2004
82004
Experiments on the Effectiveness of an Automatic Insertion of Memory Reuses into ML-like Programs
O Lee, K Yi
Proceedings of the 4th international symposium on Memory management, 97-107, 2004
82004
Kwangkeun Yi
O Lee
Proofs about a folklore let-polymorphic type inference algorithm. ACM …, 1998
81998
Static insertion of safe and effective memory reuse commands into ML-like programs
O Lee, H Yang, K Yi
Science of Computer Programming 58 (1-2), 141-178, 2005
52005
A divide-and-conquer approach for analysing overlaid data structures
O Lee, H Yang, R Petersen
Formal Methods in System Design 41 (1), 4-24, 2012
22012
Rule-Based Source-Code Analysis For Detecting Security Vulnerabilities
H Kim, TH Choi, SC Jung, O Lee, KG Doh, SY Lee
Proc. of the 10th International Workshop on Information Security Applications, 2009
22009
APROV: Another Program Verifier for Embedded Linux Device Drivers
O Lee, SC Jung, HC Ahn, T Kim
2008 10th International Conference on Advanced Communication Technology 1 …, 2008
22008
The system can't perform the operation now. Try again later.
Articles 1–20