Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jonathan D. Pincus is active.

Publication


Featured researches published by Jonathan D. Pincus.


Software - Practice and Experience | 2000

A static analyzer for finding dynamic programming errors

William R. Bush; Jonathan D. Pincus; David J. Sielaff

There are important classes of programming errors that are hard to diagnose, both manually and automatically, because they involve a programs dynamic behavior. This article describes a compile‐time analyzer that detects these dynamic errors in large, real‐world programs. The analyzer traces execution paths through the source code, modeling memory and reporting inconsistencies. In addition to avoiding false paths through the program, this approach provides valuable contextual information to the programmer who needs to understand and repair the defects. Automatically‐created models, abstracting the behavior of individual functions, allow inter‐procedural defects to be detected efficiently. A product built on these techniques has been used effectively on several large commercial programs. Copyright


applications and theory of petri nets | 2005

Towards an algebra for security policies

Jonathan D. Pincus; Jeannette M. Wing

Clashing security policies leads to vulnerabilities. Violating security policies leads to vulnerabilities. A system today operates in the context of a multitude of security policies, often one per application, one per process, one per user. The more security policies that have to be simultaneously satisfied, the more likely the possibility of a clash or violation, and hence the more vulnerable our system is to attack. Moreover, over time a systems security policies will change. These changes occur at small-scale time steps, e.g., using setuid to temporarily grant a process additional access rights; and at large-scale time steps, e.g., when a user changes his browsers security settings. We address the challenge of determining when a system is in a consistent state in the presence of diverse, numerous, and dynamic interacting security policies.


ieee symposium on security and privacy | 2004

Beyond stack smashing: recent advances in exploiting buffer overruns

Jonathan D. Pincus; Brandon Baker


Archive | 1996

Simulated program execution error detection method and apparatus

William R. Bush; Jonathan D. Pincus; Richard E. Wilbur; Debby Majors-Degnan; David J. Sielaff


Archive | 2001

Authorizing a requesting entity to operate upon data structures

Mark H. Lucovsky; Shaun D. Pierce; Michael G. Burner; Richard B. Ward; Paul J. Leach; George M. Moore; Arthur Zwiegincew; Robert M. Hyman; Jonathan D. Pincus; Daniel R. Simon


Archive | 1997

Analysis of the effect of program execution of calling components with data variable checkpointing and resource allocation analysis

Matthew Haley; Jonathan D. Pincus; William R. Bush


Archive | 1995

Computer process resource modelling method and apparatus

Matthew Haley; Jonathan D. Pincus; William R. Bush


Archive | 2001

Messaging infrastructure for identity-centric data access

Mark H. Lucovsky; Shaun D. Pierce; Alexander T. Weinert; Michael G. Burner; Richard B. Ward; Paul J. Leach; George M. Moore; Arthur Zwiegincew; Vivek Gundotra; Robert M. Hyman; Jonathan D. Pincus; Daniel R. Simon


Archive | 2000

System and method for whole-system program analysis

Timothy G. Fleehart; Jonathan D. Pincus; Jeffrey S. Wallace


Archive | 2002

Identity-centric data access

Mark H. Lucovsky; Shaun D. Pierce; Alexander T. Weinert; Michael G. Burner; Richard B. Ward; Paul J. Leach; George M. Moore; Arthur Zwiegincew; Vivek Gundotra; Robert M. Hyman; Jonathan D. Pincus; Daniel R. Simon

Collaboration


Dive into the Jonathan D. Pincus's collaboration.

Researchain Logo
Decentralizing Knowledge