Follow
David Larochelle
David Larochelle
Annenberg School of Communication at the University of Pennsylvania
Verified email at asc.upenn.edu - Homepage
Title
Cited by
Cited by
Year
Improving security using extensible lightweight static analysis
D Evans, D Larochelle
IEEE software 19 (1), 42-51, 2002
7672002
Statically detecting likely buffer overflow vulnerabilities
D Larochelle, D Evans
10th USENIX Security Symposium (USENIX Security 01), 2001
6042001
Law is code: a software engineering approach to analyzing the United States code
W Li, P Azar, D Larochelle, P Hill, AW Lo
J. Bus. & Tech. L. 10, 297, 2015
782015
Mapping local internet control
H Roberts, D Larochelle, R Faris, J Palfrey
Computer Communications Workshop (Hyannis, CA, 2011), IEEE, 2011
492011
Join point encapsulation
D Larochelle, K Scheidt, K Sullivan, Y Wei, J Winstead, A Wood
Proc. Workshop Software Eng. Properties of Languages for Aspect Technologies …, 2003
342003
Using algorithmic attribution techniques to determine authorship in unsigned judicial opinions
W Li, P Azar, D Larochelle, P Hill
Stan. Tech. L. Rev. 16, 503, 2012
252012
How and why more secure technologies succeed in legacy markets: Lessons from the success of SSH
N Rosasco, D Larochelle
Economics of Information Security, 247-254, 2004
232004
Splint Manual
D Evans, D Larochelle
Secure Programming Group University of Virginia Department of Computer Science, 2003
182003
Phil Hill, James Cox, Robert C. Berwick, and Andrew W. Lo (2013).“Using Algorithmic Attribution Techniques to Determine Authorship in Unsigned Judicial Opinions”
W Li, P Azar, D Larochelle
Stanford Technology Law Review 16 (3), 503-34, 2013
102013
Towards a Model of the Costs of Security
D Larochelle, N Rosasco
92003
Large-scale topical analysis of multiple online news sources with media cloud
J Chuang, S Fish, D Larochelle, WP Li, R Weiss
NewsKDD: Data Science for News Publishing, at KDD, 2014
82014
Estimating policy trajectories during the financial crisis
W Li, D Larochelle, AW Lo
NLP Unshared Task in PoliInformatics, 2014
42014
How and Why More Secure Technologies Succeed in Legacy Markets
N Rosasco, D Larochelle
Economics of Information Security, 247-254, 2004
2004
How and Why More Secure Technologies Succeed in Legacy Markets
N Rosasco, D Larochelle
Economics of Information Security, 247-254, 2004
2004
Towards Automatic Vulnerability Detection
D Larochelle, D Evans
Are You Scared Yet?
J Thornton, S Nomad, D Larochelle, S Writer
The system can't perform the operation now. Try again later.
Articles 1–16