Author of the publication

Beyond Reachability: Shape Abstraction in the Presence of Pointer Arithmetic.

, , , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 182-203. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Infer: An Automatic Program Verifier for Memory Safety of C Programs., and . NASA Formal Methods, volume 6617 of Lecture Notes in Computer Science, page 459-465. Springer, (2011)Compositional Shape Analysis by Means of Bi-Abduction., , , and . J. ACM, 58 (6): 26:1-26:66 (2011)Automatic Termination Proofs for Programs with Shape-Shifting Heaps., , , and . CAV, volume 4144 of Lecture Notes in Computer Science, page 386-400. Springer, (2006)FAUSTA: Scaling Dynamic Analysis with Traffic Generation at WhatsApp., , , , , , , and . ICST, page 267-278. IEEE, (2022)Abstract Graph Transformation, and . Electronic Notes in Theoretical Computer Science, 157 (1): 39--59 (May 2006)Information Leakage Analysis of Complex C Code and Its application to OpenSSL., , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 909-925. (2016)Runtime Verification Based on Register Automata, , , and . CoRR, (2012)Verification of Snapshot Isolation in Transactional Memory Java Programs., , , and . ECOOP, volume 7313 of Lecture Notes in Computer Science, page 640-664. Springer, (2012)A Voyage to the Deep-Heap.. SAS, volume 7460 of Lecture Notes in Computer Science, page 3. Springer, (2012)Abductive Inference for Reasoning about Heaps.. APLAS, volume 5356 of Lecture Notes in Computer Science, page 1-2. Springer, (2008)