Improving security using extensible lightweight static analysis D Evans, D Larochelle IEEE software 19 (1), 42-51, 2002 | 767 | 2002 |
Statically detecting likely buffer overflow vulnerabilities D Larochelle, D Evans 10th USENIX Security Symposium (USENIX Security 01), 2001 | 604 | 2001 |
Law is code: a software engineering approach to analyzing the United States code W Li, P Azar, D Larochelle, P Hill, AW Lo J. Bus. & Tech. L. 10, 297, 2015 | 78 | 2015 |
Mapping local internet control H Roberts, D Larochelle, R Faris, J Palfrey Computer Communications Workshop (Hyannis, CA, 2011), IEEE, 2011 | 49 | 2011 |
Join point encapsulation D Larochelle, K Scheidt, K Sullivan, Y Wei, J Winstead, A Wood Proc. Workshop Software Eng. Properties of Languages for Aspect Technologies …, 2003 | 34 | 2003 |
Using algorithmic attribution techniques to determine authorship in unsigned judicial opinions W Li, P Azar, D Larochelle, P Hill Stan. Tech. L. Rev. 16, 503, 2012 | 25 | 2012 |
How and why more secure technologies succeed in legacy markets: Lessons from the success of SSH N Rosasco, D Larochelle Economics of Information Security, 247-254, 2004 | 23 | 2004 |
Splint Manual D Evans, D Larochelle Secure Programming Group University of Virginia Department of Computer Science, 2003 | 18 | 2003 |
Phil Hill, James Cox, Robert C. Berwick, and Andrew W. Lo (2013).“Using Algorithmic Attribution Techniques to Determine Authorship in Unsigned Judicial Opinions” W Li, P Azar, D Larochelle Stanford Technology Law Review 16 (3), 503-34, 2013 | 10 | 2013 |
Towards a Model of the Costs of Security D Larochelle, N Rosasco | 9 | 2003 |
Large-scale topical analysis of multiple online news sources with media cloud J Chuang, S Fish, D Larochelle, WP Li, R Weiss NewsKDD: Data Science for News Publishing, at KDD, 2014 | 8 | 2014 |
Estimating policy trajectories during the financial crisis W Li, D Larochelle, AW Lo NLP Unshared Task in PoliInformatics, 2014 | 4 | 2014 |
How and Why More Secure Technologies Succeed in Legacy Markets N Rosasco, D Larochelle Economics of Information Security, 247-254, 2004 | | 2004 |
How and Why More Secure Technologies Succeed in Legacy Markets N Rosasco, D Larochelle Economics of Information Security, 247-254, 2004 | | 2004 |
Towards Automatic Vulnerability Detection D Larochelle, D Evans | | |
Are You Scared Yet? J Thornton, S Nomad, D Larochelle, S Writer | | |