Why Use Datalog to Analyze Programs? Team: John Whaley, Ben Livshits, Michael Martin, Dzintars Avots, Michael Carbin, Chris Unkel.
Cisco 2014 Midyear Security Report
V 741 w Fs Configuration Guide
Understanding Botnets: How Massive Internet Break-Ins Fuel an Underground Economy Jason Franklin and Vern Paxson.
Context-Sensitive Program Analysis as Database Queries Team: John Whaley, Ben Livshits, Michael Martin, Dzintars Avots, Michael Carbin, Chris Unkel.