Alexander Jordan
Alexander Jordan
Oracle Labs
Verified email at oracle.com - Homepage
Title
Cited by
Cited by
Year
T-CREST: Time-predictable multi-core architecture for embedded systems
M Schoeberl, S Abbaspour, B Akesson, N Audsley, R Capasso, J Garside, ...
Journal of Systems Architecture 61 (9), 449-471, 2015
1592015
Static analysis of worst-case stack cache behavior
A Jordan, F Brandner, M Schoeberl
Proceedings of the 21st International conference on Real-Time Networks and …, 2013
252013
Combining string abstract domains for JavaScript analysis: an evaluation
R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2017
222017
Static profiling of the worst-case in real-time programs
F Brandner, S Hepp, A Jordan
Proceedings of the 20th International Conference on Real-Time and Network …, 2012
152012
Lazy spilling for a time-predictable stack cache: Implementation and analysis
S Abbaspour, A Jordan, F Brandner
14th International Workshop on Worst-Case Execution Time Analysis, 83-92, 2014
132014
IR-level versus machine-level if-conversion for predicated architectures
A Jordan, N Kim, A Krall
Proceedings of the 10th Workshop on Optimizations for DSP and Embedded …, 2013
92013
Criticality: static profiling for real-time programs
F Brandner, S Hepp, A Jordan
Real-Time Systems 50 (3), 377-410, 2014
82014
A FFOGATO: runtime detection of injection attacks for Node. js
F Gauthier, B Hassanshahi, A Jordan
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 94-99, 2018
62018
Reference Abstract Domains and Applications to String Analysis
R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ...
Fundamenta Informaticae 158 (4), 297-326, 2018
62018
Automatic Modeling of Opaque Code for JavaScript Static Analysis
J Park, A Jordan, S Ryu
International Conference on Fundamental Approaches to Software Engineering …, 2019
42019
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
arXiv preprint arXiv:1810.12490, 2018
32018
Refinement of worst-case execution time bounds by graph pruning
F Brandner, A Jordan
Computer Languages, Systems & Structures 40 (3-4), 155-170, 2014
32014
Evaluating and estimating the WCET criticality metric
A Jordan
Proceedings of the 11th Workshop on Optimizations for DSP and Embedded …, 2014
32014
Subgraph-Based Refinement of Worst-Case Execution Time Bounds
F Brandner, A Jordan
22014
Unacceptable Behavior: Robust PDF Malware Detection Using Abstract Interpretation
A Jordan, F Gauthier, B Hassanshahi, D Zhao
Proceedings of the 14th ACM SIGSAC Workshop on Programming Languages and …, 2019
12019
Trade-offs in managing risk and technical debt in industrial research labs: an experience report
F Gauthier, A Jordan, P Krishnan, B Hassanshahi, JG Süß, S Bae, H Lee
Proceedings of the 3rd International Conference on Technical Debt, 98-102, 2020
2020
Detecting malicious code embedded in documents
AW Jordan, F Gauthier
US Patent 10,657,252, 2020
2020
Dynamic modeling for opaque code during static analysis
A Jordan, J Park
US Patent 10,620,946, 2020
2020
Taint analysis with access paths
N Allen, F Gauthier, A Jordan
US Patent App. 16/050,160, 2020
2020
Staged dynamic taint flow inference
B Hassanshahi, H Lee, A Jordan, F Gauthier
US Patent App. 16/058,876, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20