Alexander Jordan
Alexander Jordan
Oracle Labs
Verified email at - Homepage
Cited by
Cited by
T-CREST: Time-predictable multi-core architecture for embedded systems
M Schoeberl, S Abbaspour, B Akesson, N Audsley, R Capasso, J Garside, ...
Journal of Systems Architecture 61 (9), 449-471, 2015
Combining string abstract domains for JavaScript analysis: An evaluation
R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ...
Tools and Algorithms for the Construction and Analysis of Systems: 23rd …, 2017
Static analysis of worst-case stack cache behavior
A Jordan, F Brandner, M Schoeberl
Proceedings of the 21st International conference on Real-Time Networks and …, 2013
A FFOGATO: runtime detection of injection attacks for Node. js
F Gauthier, B Hassanshahi, A Jordan
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018
Static profiling of the worst-case in real-time programs
F Brandner, S Hepp, A Jordan
Proceedings of the 20th International Conference on Real-Time and Network …, 2012
Lazy spilling for a time-predictable stack cache: Implementation and analysis
S Abbaspour, A Jordan, F Brandner
14th International Workshop on Worst-Case Execution Time Analysis, 83-92, 2014
Reference Abstract Domains and Applications to String Analysis
R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ...
Fundamenta Informaticae 158 (4), 297-326, 2018
Criticality: static profiling for real-time programs
F Brandner, S Hepp, A Jordan
Real-Time Systems 50 (3), 377-410, 2014
Automatic Modeling of Opaque Code for JavaScript Static Analysis
J Park, A Jordan, S Ryu
International Conference on Fundamental Approaches to Software Engineering …, 2019
IR-level versus machine-level if-conversion for predicated architectures
A Jordan, N Kim, A Krall
Proceedings of the 10th Workshop on Optimizations for DSP and Embedded …, 2013
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
arXiv preprint arXiv:1810.12490, 2018
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
Refinement of worst-case execution time bounds by graph pruning
F Brandner, A Jordan
Computer Languages, Systems & Structures 40 (3-4), 155-170, 2014
Evaluating and estimating the WCET criticality metric
A Jordan
Proceedings of the 11th Workshop on Optimizations for DSP and Embedded …, 2014
IFDS Taint Analysis with Access Paths
N Allen, F Gauthier, A Jordan
arXiv preprint arXiv:2103.16240, 2021
Trade-offs in managing risk and technical debt in industrial research labs: an experience report
F Gauthier, A Jordan, P Krishnan, B Hassanshahi, JG Süß, S Bae, H Lee
Proceedings of the 3rd International Conference on Technical Debt, 98-102, 2020
Detecting malicious code embedded in documents
AW Jordan, F Gauthier
US Patent 10,657,252, 2020
Subgraph-Based Refinement of Worst-Case Execution Time Bounds
F Brandner, A Jordan
Tech. Rep. hal-00978015 (version 1), ENSTA, 2014
Taint analysis with access paths
N Allen, F Gauthier, A Jordan
US Patent 10,789,362, 2020
Dynamic modeling for opaque code during static analysis
A Jordan, J Park
US Patent 10,620,946, 2020
The system can't perform the operation now. Try again later.
Articles 1–20