Hiralal Agrawal - Academia.edu (original) (raw)
Papers by Hiralal Agrawal
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
Current malware detection tools focus largely on malicious code that is injected into target prog... more Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner
Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '94, 1994
Page 1. Dominators, Super Blocks, and Program Coverage Hiralal Agrawal Bellcore 445 South Street ... more Page 1. Dominators, Super Blocks, and Program Coverage Hiralal Agrawal Bellcore 445 South Street Morristown, NJ 07960 hira@bellcore. com Abstract ... A node, u, predominates a node, v, denoted as ,, u ~ v, if every path from the entry node to v con-tains U2. ...
Proceedings of the Symposium on Testing Analysis and Verification, Oct 1, 1991
Program slices are useful in debugging. Most work on program slicing to date has concentrated on ... more Program slices are useful in debugging. Most work on program slicing to date has concentrated on nding slices of programs involving only scalar variables. Pointers and composite variables do not lend themselves well to static analysis, especially when the language involved is not strongly-typed. When debugging a program, however, we are interested in analyzing the program behavior for testcases that reveal a fault. In this paper, we present a uniform approach to handling pointers and composite variables such a s arrays, records, and unions for the purpose of obtaining dynamic program slices. The dynamic approach proposed works well even when the language involved allows unconstrained pointers and performs no runtime checks, as in C.
Acm Sigsoft Software Engineering Notes, Apr 1, 1989
Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineeri... more Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineering Notes 14:22, 49-56, 4/1989. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford, Critical slicing for software fault localization, ACM SIGSOFT Software Engineering Notes, v.21 n.3, p.121-134, May 1996 70 Software Engineering(General)(CI).
Proceedings of the Acm Sigplan 1994 Conference, Jun 1, 1994
... infor-mation. More importantly, it lends itself to substantial simplification when alljump st... more ... infor-mation. More importantly, it lends itself to substantial simplification when alljump statements in a program are structured jump statements, such as break, con-tinue, and return statements, or goto statements that I we ...
ACM SIGSOFT Software Engineering Notes, 1989
Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineeri... more Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineering Notes 14:22, 49-56, 4/1989. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford, Critical slicing for software fault localization, ACM SIGSOFT Software Engineering Notes, v.21 n.3, p.121-134, May 1996 70 Software Engineering(General)(CI).
Spe, 1990
Programmers spend considerable time debugging code. Several tools are available to help them in t... more Programmers spend considerable time debugging code. Several tools are available to help them in this task, varying from hexadecimal dumps of program state to window-and mouse-based interactive debuggers, but the task still remains complex and difficult. Most of these conventional debuggers provide breakpoints and traces as their main debugging aids. These features have changed little in the past 15-20 years despite the increased complexity of software systems on which debuggers are used.
... I would also like to express my thanks to Ahmed Elmagarmid, Bob Horgan, Aditya Mathur, Piyush... more ... I would also like to express my thanks to Ahmed Elmagarmid, Bob Horgan, Aditya Mathur, Piyush Mehrotra, Hsin Pan, Ryan Stansifer, Guda Venkatesh, Nok Viravan, ... ABSTRACT Agrawal, Hiralal. ... further narrow down the search to a speci c program unit. When no new speci ca-...
Programmers spend considerable time debugging code. Several tools are available to help them in t... more Programmers spend considerable time debugging code. Several tools are available to help them in this task, varying from hexadecimal dumps of program state to window- and mouse-based interactive debuggers, but the task still remains complex and difficult. Most of these conventional debuggers provide breakpoints and traces as their main debugging aids. These features have changed little in the past 15-20
Proceedings. 20th International Conference on Data Engineering, 2004
The need of a data stream management system (DSMS), with the capability of querying continuous da... more The need of a data stream management system (DSMS), with the capability of querying continuous data streams, has been well understood by the database research community. We provide an overview on a DSMS prototype called T2. T2 inherits some of the concepts of an early prototype, Tribeca [M. Sullivan et al. (1998)], developed also at Telcordia, but with complete new
An execution backtracking facilityininteractive source debuggers allows users to mirror their tho... more An execution backtracking facilityininteractive source debuggers allows users to mirror their thought processes while debugging --- working backwards from the location where an error is manifested and determining the conditions under which the error occurred. Such a facility also allows a user to change program characteristics and reexecute from arbitrary points within the program under examination --- a #what-if " capability.
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
Current malware detection tools focus largely on malicious code that is injected into target prog... more Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner
Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '94, 1994
Page 1. Dominators, Super Blocks, and Program Coverage Hiralal Agrawal Bellcore 445 South Street ... more Page 1. Dominators, Super Blocks, and Program Coverage Hiralal Agrawal Bellcore 445 South Street Morristown, NJ 07960 hira@bellcore. com Abstract ... A node, u, predominates a node, v, denoted as ,, u ~ v, if every path from the entry node to v con-tains U2. ...
Proceedings of the Symposium on Testing Analysis and Verification, Oct 1, 1991
Program slices are useful in debugging. Most work on program slicing to date has concentrated on ... more Program slices are useful in debugging. Most work on program slicing to date has concentrated on nding slices of programs involving only scalar variables. Pointers and composite variables do not lend themselves well to static analysis, especially when the language involved is not strongly-typed. When debugging a program, however, we are interested in analyzing the program behavior for testcases that reveal a fault. In this paper, we present a uniform approach to handling pointers and composite variables such a s arrays, records, and unions for the purpose of obtaining dynamic program slices. The dynamic approach proposed works well even when the language involved allows unconstrained pointers and performs no runtime checks, as in C.
Acm Sigsoft Software Engineering Notes, Apr 1, 1989
Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineeri... more Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineering Notes 14:22, 49-56, 4/1989. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford, Critical slicing for software fault localization, ACM SIGSOFT Software Engineering Notes, v.21 n.3, p.121-134, May 1996 70 Software Engineering(General)(CI).
Proceedings of the Acm Sigplan 1994 Conference, Jun 1, 1994
... infor-mation. More importantly, it lends itself to substantial simplification when alljump st... more ... infor-mation. More importantly, it lends itself to substantial simplification when alljump statements in a program are structured jump statements, such as break, con-tinue, and return statements, or goto statements that I we ...
ACM SIGSOFT Software Engineering Notes, 1989
Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineeri... more Bibliography on debugging and backtracking. H Agrawal, EH Spafford ACM SIGSOFT Software Engineering Notes 14:22, 49-56, 4/1989. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford, Critical slicing for software fault localization, ACM SIGSOFT Software Engineering Notes, v.21 n.3, p.121-134, May 1996 70 Software Engineering(General)(CI).
Spe, 1990
Programmers spend considerable time debugging code. Several tools are available to help them in t... more Programmers spend considerable time debugging code. Several tools are available to help them in this task, varying from hexadecimal dumps of program state to window-and mouse-based interactive debuggers, but the task still remains complex and difficult. Most of these conventional debuggers provide breakpoints and traces as their main debugging aids. These features have changed little in the past 15-20 years despite the increased complexity of software systems on which debuggers are used.
... I would also like to express my thanks to Ahmed Elmagarmid, Bob Horgan, Aditya Mathur, Piyush... more ... I would also like to express my thanks to Ahmed Elmagarmid, Bob Horgan, Aditya Mathur, Piyush Mehrotra, Hsin Pan, Ryan Stansifer, Guda Venkatesh, Nok Viravan, ... ABSTRACT Agrawal, Hiralal. ... further narrow down the search to a speci c program unit. When no new speci ca-...
Programmers spend considerable time debugging code. Several tools are available to help them in t... more Programmers spend considerable time debugging code. Several tools are available to help them in this task, varying from hexadecimal dumps of program state to window- and mouse-based interactive debuggers, but the task still remains complex and difficult. Most of these conventional debuggers provide breakpoints and traces as their main debugging aids. These features have changed little in the past 15-20
Proceedings. 20th International Conference on Data Engineering, 2004
The need of a data stream management system (DSMS), with the capability of querying continuous da... more The need of a data stream management system (DSMS), with the capability of querying continuous data streams, has been well understood by the database research community. We provide an overview on a DSMS prototype called T2. T2 inherits some of the concepts of an early prototype, Tribeca [M. Sullivan et al. (1998)], developed also at Telcordia, but with complete new
An execution backtracking facilityininteractive source debuggers allows users to mirror their tho... more An execution backtracking facilityininteractive source debuggers allows users to mirror their thought processes while debugging --- working backwards from the location where an error is manifested and determining the conditions under which the error occurred. Such a facility also allows a user to change program characteristics and reexecute from arbitrary points within the program under examination --- a #what-if " capability.