default search action
Paul E. Black
Person information
- affiliation: NIST, Gaithersburg, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j11]Paul E. Black, David W. Flater, Irena Bojanova:
Algorithms and Data Structures for New Models of Computation. IT Prof. 23(1): 9-15 (2021) - [c25]Suzanna Schmeelk, Bryan Rosado, Paul E. Black:
Blockchain Smart Contracts Static Analysis for Software Assurance. SAI (2) 2021: 881-890 - [i1]Paul E. Black, Barbara Guttman, Vadim Okun:
Guidelines on Minimum Standards for Developer Verification of Software. CoRR abs/2107.12850 (2021)
2010 – 2019
- 2019
- [j10]Paul E. Black, Monika Singh:
Opaque Wrappers and Patching: Negative Results. Computer 52(12): 89-93 (2019) - [j9]Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng:
Defects and Vulnerabilities in Smart Contracts, a Classification using the NIST Bugs Framework. Int. J. Networked Distributed Comput. 7(3): 121-132 (2019) - [c24]Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu:
Information Exposure (IEX): A New Class in the Bugs Framework (BF). COMPSAC (1) 2019: 559-564 - [c23]Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng:
Classification of Smart Contract Bugs Using the NIST Bugs Framework. SERA 2019: 116-123 - [c22]Ezio Bartocci, Dirk Beyer, Paul E. Black, Grigory Fedyukovich, Hubert Garavel, Arnd Hartmanns, Marieke Huisman, Fabrice Kordon, Julian Nagele, Mihaela Sighireanu, Bernhard Steffen, Martin Suda, Geoff Sutcliffe, Tjark Weber, Akihisa Yamada:
TOOLympics 2019: An Overview of Competitions in Formal Methods. TACAS (3) 2019: 3-24 - 2018
- [c21]Irena Bojanova, Yaacov Yesha, Paul E. Black:
Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN). COMPSAC (1) 2018: 738-745 - 2016
- [j8]Paul E. Black, Irena Bojanova:
Defeating Buffer Overflow: A Trivial but Dangerous Bug. IT Prof. 18(6): 58-61 (2016) - [c20]Irena Bojanova, Paul E. Black, Yaacov Yesha, Yan Wu:
The Bugs Framework (BF): A Structured Approach to Express Bugs. QRS 2016: 175-182 - 2014
- [j7]Paul E. Black:
Test Generation Using Model Checking and Specification Mutation. IT Prof. 16(2): 17-21 (2014) - [j6]Paul E. Black:
NIST Contributions to IT. IT Prof. 16(2): 45-49 (2014) - 2013
- [j5]James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas:
Does Security Trump Reliability? Computer 46(11): 84-86 (2013) - 2012
- [j4]Tim Boland, Paul E. Black:
Juliet 1.1 C/C++ and Java Test Suite. Computer 45(10): 88-90 (2012) - [j3]Paul E. Black:
Static Analyzers: Seat Belts for Your Code. IEEE Secur. Priv. 10(3): 48-52 (2012) - 2011
- [c19]Paul E. Black:
Counting Bugs is Harder Than You Think. SCAM 2011: 1-9 - [c18]Joyce L. Tokar, F. David Jones, Paul E. Black, Chris E. Dupilka:
Software vulnerabilities precluded by spark. SIGAda 2011: 39-46 - 2010
- [c17]Elizabeth Fong, Paul E. Black, Richard F. Leslie, Simson L. Garfinkel, Larry Wagoner, Gary McGraw, Jeff Williams:
Wouldn't it be nice to have software labels. SIGAda 2010: 31-32
2000 – 2009
- 2008
- [c16]Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E. Black, Eric Dalci:
Building a Test Suite for Web Application Scanners. HICSS 2008: 478 - 2007
- [c15]Vadim Okun, William F. Guthrie, Romain Gaucher, Paul E. Black:
Effect of static analysis tools on software security: preliminary investigation. QoP 2007: 1-5 - [c14]Paul E. Black:
Static analysis summit II. SIGAda 2007: 101-107 - 2006
- [c13]Paul E. Black:
Software Assurance During Maintenance. ICSM 2006: 70-72 - 2005
- [c12]Paul E. Black, Michael Kass:
Software security assurance tools, techniques and metrics (SSATTM). ASE 2005: 461 - [c11]Paul E. Black:
Software Assurance Metrics and Tool Evaluation. Software Engineering Research and Practice 2005: 829-835 - 2004
- [j2]Vadim Okun, Paul E. Black, Yaacov Yesha:
Comparison of fault classes in specification-based testing. Inf. Softw. Technol. 46(8): 525-533 (2004) - 2002
- [j1]Paul E. Black, D. Richard Kuhn, Carl J. Williams:
Quantum computing and communication. Adv. Comput. 56: 189-244 (2002) - 2000
- [c10]Paul E. Black, Vadim Okun, Yaacov Yesha:
Mutation Operators for Specifications. ASE 2000: 81-
1990 – 1999
- 1999
- [c9]Paul Ammann, Paul E. Black:
A Specification-Based Coverage Metric to Evaluate Test Sets. HASE 1999: 239-248 - 1998
- [c8]Charles Hagwood, Raghu Kacker, James Yen, David Banks, Lynne Rosenthal, Leonard Gallagher, Paul E. Black:
Reliability of Conformance Tests. COMPSAC 1998: 368-373 - [c7]Paul E. Black, Phillip J. Windley:
Formal Verification of Secure Programs in the Presence of Side Effects. HICSS (3) 1998: 327- - [c6]Paul Ammann, Paul E. Black, William Majurski:
Using Model Checking to Generate Tests from Specifications. ICFEM 1998: 46-55 - 1997
- [c5]Paul E. Black, Phillip J. Windley:
Verifying Resilient Software. HICSS (5) 1997: 262-266 - 1996
- [c4]Paul E. Black, Phillip J. Windley:
Inference Rules for Programming Languages with Side Effects in Expressions. TPHOLs 1996: 51-60 - 1995
- [c3]Paul E. Black, Phillip J. Windley:
Autotically Synthesized Term Denotation Predicates: A Proof Aid. TPHOLs 1995: 46-57 - 1994
- [c2]Mor Harchol-Balter, Paul E. Black:
Queueing Analysis of Oblivious Packet-Routing Networks. SODA 1994: 583-592
1980 – 1989
- 1988
- [c1]Paul E. Black:
GDIST: A Distributed Configuration Control System. SCM 1988: 276-284
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint