default search action
Dawson R. Engler
Person information
- affiliation: Stanford University, USA
- award: ACM Grace Murray Hopper Award, 2008
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c63]Fraser Brown, Deian Stefan, Dawson R. Engler:
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. USENIX Security Symposium 2020: 199-216
2010 – 2019
- 2017
- [c62]Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson R. Engler, Ranjit Jhala, Deian Stefan:
Finding and Preventing Bugs in JavaScript Bindings. IEEE Symposium on Security and Privacy 2017: 559-578 - 2016
- [c61]Fraser Brown, Andres Nötzli, Dawson R. Engler:
How to Build Static Checking Systems Using Orders of Magnitude Less Code. ASPLOS 2016: 143-157 - [c60]David A. Ramos, Dawson R. Engler:
Under-Constrained Symbolic Execution: Correctness Checking for Real Code. USENIX ATC 2016 - 2015
- [c59]David A. Ramos, Dawson R. Engler:
Under-Constrained Symbolic Execution: Correctness Checking for Real Code. USENIX Security Symposium 2015: 49-64 - 2014
- [c58]Anthony Romano, Dawson R. Engler:
symMMU: symbolically executed runtime libraries for symbolic memory access. ASE 2014: 247-258 - 2013
- [c57]Anthony Romano, Dawson R. Engler:
Expression Reduction from Programs in a Symbolic Binary Executor. SPIN 2013: 301-319 - [c56]Suhabe Bugrara, Dawson R. Engler:
Redundant State Detection for Dynamic Symbolic Execution. USENIX ATC 2013: 199-211 - 2011
- [c55]David A. Ramos, Dawson R. Engler:
Practical, Low-Effort Equivalence Verification of Real Code. CAV 2011: 669-685 - [c54]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup K. Ghosh, Dawson R. Engler, Marc Dacier, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c53]Philip J. Guo, Dawson R. Engler:
Using automatic persistent memoization to facilitate data analysis scripting. ISSTA 2011: 287-297 - [c52]Philip J. Guo, Dawson R. Engler:
CDE: Using System Call Interposition to Automatically Create Portable Software Packages. USENIX ATC 2011 - 2010
- [j10]Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler:
A few billion lines of code later: using static analysis to find bugs in the real world. Commun. ACM 53(2): 66-75 (2010) - [c51]Philip J. Guo, Dawson R. Engler:
Towards Practical Incremental Recomputation for Scientists: An Implementation for the Python Language. TaPP 2010
2000 – 2009
- 2009
- [c50]Philip J. Guo, Dawson R. Engler:
Linux Kernel Developer Responses to Static Analysis Bug Reports. USENIX ATC 2009 - 2008
- [j9]Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: Automatically Generating Inputs of Death. ACM Trans. Inf. Syst. Secur. 12(2): 10:1-10:38 (2008) - [c49]Dawson R. Engler:
Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems. FM 2008: 33 - [c48]Cristian Cadar, Daniel Dunbar, Dawson R. Engler:
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI 2008: 209-224 - [c47]Peter Boonstoppel, Cristian Cadar, Dawson R. Engler:
RWset: Attacking Path Explosion in Constraint-Based Test Generation. TACAS 2008: 351-366 - 2007
- [c46]Dawson R. Engler:
A System's Hackers Crash Course: Techniques that Find Lots of Bugs in Real (Storage) System Code. FAST 2007 - [c45]Ted Kremenek, Andrew Y. Ng, Dawson R. Engler:
A Factor Graph Model for Software Bug Finding. IJCAI 2007: 2510-2516 - [c44]Dawson R. Engler, Daniel Dunbar:
Under-constrained execution: making automatic code destruction easy and scalable. ISSTA 2007: 1-4 - 2006
- [j8]Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi:
Using model checking to find serious file system errors. ACM Trans. Comput. Syst. 24(4): 393-423 (2006) - [c43]Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
EXE: automatically generating inputs of death. CCS 2006: 322-335 - [c42]Junfeng Yang, Can Sar, Dawson R. Engler:
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors. OSDI 2006: 131-146 - [c41]Ted Kremenek, Paul Twohey, Godmar Back, Andrew Y. Ng, Dawson R. Engler:
From Uncertainty to Belief: Inferring the Specification Within. OSDI 2006: 161-176 - [c40]Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler:
Automatically Generating Malicious Disks using Symbolic Execution. S&P 2006: 243-257 - 2005
- [c39]Dawson R. Engler:
Static Analysis Versus Model Checking for Bug Finding. CONCUR 2005: 1 - [c38]Cristian Cadar, Dawson R. Engler:
Execution Generated Test Cases: How to Make Systems Code Crash Itself. SPIN 2005: 2-23 - 2004
- [c37]Madanlal Musuvathi, Dawson R. Engler:
Model Checking Large Network Protocol Implementations. NSDI 2004: 155-168 - [c36]Junfeng Yang, Paul Twohey, Dawson R. Engler, Madanlal Musuvathi:
Using Model Checking to Find Serious File System Errors (Awarded Best Paper!). OSDI 2004: 273-288 - [c35]Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler:
Correlation exploitation in error ranking. SIGSOFT FSE 2004: 83-93 - [c34]Dawson R. Engler, Madanlal Musuvathi:
Static Analysis versus Software Model Checking for Bug Finding. VMCAI 2004: 191-210 - 2003
- [j7]Seth Hallem, David Y. W. Park, Dawson R. Engler:
Uprooting Software Defects at the Source. ACM Queue 1(8): 64-71 (2003) - [j6]Yichen Xie, Dawson R. Engler:
Using Redundancies to Find Errors. IEEE Trans. Software Eng. 29(10): 915-928 (2003) - [c33]Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler:
MECA: an extensible, expressive system and language for statically checking security properties. CCS 2003: 321-334 - [c32]Ted Kremenek, Dawson R. Engler:
Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations. SAS 2003: 295-315 - [c31]Yichen Xie, Andy Chou, Dawson R. Engler:
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. ESEC / SIGSOFT FSE 2003: 327-336 - [c30]Dawson R. Engler, Ken Ashcraft:
RacerX: effective, static detection of race conditions and deadlocks. SOSP 2003: 237-252 - [c29]Madanlal Musuvathi, Dawson R. Engler:
Some Lessons from Using Static Analysis and Software Model Checking for Bug Finding. SoftMC@CAV 2003: 378-404 - 2002
- [j5]Gregory R. Ganger, Dawson R. Engler, M. Frans Kaashoek, Héctor M. Briceño, Russell Hunt, Thomas Pinckney:
Fast and flexible application-level networking on exokernel systems. ACM Trans. Comput. Syst. 20(1): 49-83 (2002) - [c28]Madanlal Musuvathi, David Y. W. Park, Andy Chou, Dawson R. Engler, David L. Dill:
CMC: A Pragmatic Approach to Model Checking Real Code. OSDI 2002 - [c27]Benjamin Chelf, Dawson R. Engler, Seth Hallem:
How to write system-specific, static checkers in metal. PASTE 2002: 51-60 - [c26]Seth Hallem, Benjamin Chelf, Yichen Xie, Dawson R. Engler:
A System and Language for Building System-Specific, Static Analyses. PLDI 2002: 69-82 - [c25]Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner:
Cool security trends. SACMAT 2002: 53 - [c24]Madanlal Musuvathi, Andy Chou, David L. Dill, Dawson R. Engler:
Model checking system software with CMC. ACM SIGOPS European Workshop 2002: 219-222 - [c23]Yichen Xie, Dawson R. Engler:
Using redundancies to find errors. SIGSOFT FSE 2002: 51-60 - [c22]Ken Ashcraft, Dawson R. Engler:
Using Programmer-Written Compiler Extensions to Catch Security Holes. S&P 2002: 143-159 - 2001
- [c21]David Lie, Andy Chou, Dawson R. Engler, David L. Dill:
A simple method for extracting models for protocol code. ISCA 2001: 192-203 - [c20]Dawson R. Engler, David Yu Chen, Andy Chou:
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code. SOSP 2001: 57-72 - [c19]Andy Chou, Junfeng Yang, Benjamin Chelf, Seth Hallem, Dawson R. Engler:
An Empirical Study of Operating System Errors. SOSP 2001: 73-88 - [c18]Wilson C. Hsieh, Dawson R. Engler, Godmar Back:
Reverse-Engineering Instruction Encodings. USENIX ATC, General Track 2001: 133-145 - 2000
- [c17]Andy Chou, Benjamin Chelf, Dawson R. Engler, Mark A. Heinrich:
Using Meta-level Compilation to Check FLASH Protocol Code. ASPLOS 2000: 59-70 - [c16]Dawson R. Engler, Wilson C. Hsieh:
Derive: a tool that automatically reverse-engineers instruction encodings. Dynamo 2000: 12-22 - [c15]Dawson R. Engler, Benjamin Chelf, Andy Chou, Seth Hallem:
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. OSDI 2000: 1-16
1990 – 1999
- 1999
- [j4]Massimiliano Poletto, Wilson C. Hsieh, Dawson R. Engler, M. Frans Kaashoek:
'C and tcc: A Language and Compiler for Dynamic Code Generation. ACM Trans. Program. Lang. Syst. 21(2): 324-369 (1999) - [j3]Dawson R. Engler:
Interface Compilation: Steps Toward Compiling Program Interfaces as Languages. IEEE Trans. Software Eng. 25(3): 387-400 (1999) - 1998
- [b1]Dawson R. Engler:
The exokernel operating system architecture. Massachusetts Institute of Technology, Cambridge, MA, USA, 1998 - 1997
- [j2]Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek:
ASHs application-specific handlers for high-performance messaging. IEEE/ACM Trans. Netw. 5(4): 460-474 (1997) - [c14]Dawson R. Engler:
Incorporating Application Semantics and Control into Compilation. DSL 1997 - [c13]Massimiliano Poletto, Dawson R. Engler, M. Frans Kaashoek:
tcc: A System for Fast, Flexible, and High-level Dynamic Code Generation. PLDI 1997: 109-121 - [c12]M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Héctor M. Briceño, Russell Hunt, David Mazières, Thomas Pinckney, Robert Grimm, John Jannotti, Kenneth Mackenzie:
Application Performance and Flexibility on Exokernel Systems. SOSP 1997: 52-65 - 1996
- [c11]Dawson R. Engler:
VCODE: a Retargetable, Extensible, Very Fast Dynamic Code Generation System. PLDI 1996: 160-170 - [c10]Dawson R. Engler, Wilson C. Hsieh, M. Frans Kaashoek:
C: A Language for High-Level, Efficient, and Machine-Independent Dynamic Code Generation. POPL 1996: 131-144 - [c9]Deborah A. Wallach, Dawson R. Engler, M. Frans Kaashoek:
ASHs: Application-Specific Handlers for High-Performance Messaging. SIGCOMM 1996: 40-52 - [c8]Dawson R. Engler, M. Frans Kaashoek:
DPF: Fast, Flexible Message Demultiplexing Using Dynamic Code Generation. SIGCOMM 1996: 53-59 - [c7]M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ganger, Deborah A. Wallach:
Server operating systems. ACM SIGOPS European Workshop 1996: 141-148 - 1995
- [j1]Dawson R. Engler, M. Frans Kaashoek, James W. O'Toole Jr.:
The Operating System Kernel as a Secure Programmable Machine. ACM SIGOPS Oper. Syst. Rev. 29(1): 78-82 (1995) - [c6]Dawson R. Engler, Sandeep K. Gupta, M. Frans Kaashoek:
AVM: application-level virtual memory. HotOS 1995: 72-77 - [c5]Dawson R. Engler, M. Frans Kaashoek:
Exterminate all operating system abstractions. HotOS 1995: 78-85 - [c4]Dawson R. Engler, M. Frans Kaashoek, James W. O'Toole Jr.:
Exokernel: An Operating System Architecture for Application-Level Resource Management. SOSP 1995: 251-266 - 1994
- [c3]Dawson R. Engler, Todd A. Proebsting:
DCG: An Efficient, Retargetable Dynamic Code Generation System. ASPLOS 1994: 263-272 - [c2]Dawson R. Engler, M. Frans Kaashoek, James W. O'Toole Jr.:
The Exokernel Approach to Operating System Extensibility (Panel Statement). OSDI 1994: 198 - [c1]Dawson R. Engler, M. Frans Kaashoek, James W. O'Toole Jr.:
The Operating System Kernel as a Secure Programmable Machine. ACM SIGOPS European Workshop 1994: 62-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint