Author of the publication

On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution.

, , , and . WWW, page 58-69. ACM / IW3C2, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs., , , , and . CCS, page 3253-3267. ACM, (2022)ACTOR: Action-Guided Kernel Fuzzing., , , , , , , and . USENIX Security Symposium, page 5003-5020. USENIX Association, (2023)UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 2777-2794. USENIX Association, (2021)Guiding Directed Fuzzing with Feasibility., , , and . EuroS&P Workshops, page 42-49. IEEE, (2023)Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection., , , and . NDSS, The Internet Society, (2022)EMS: History-Driven Mutation for Coverage-based Fuzzing., , , , , , and . NDSS, The Internet Society, (2022)How ChatGPT is Solving Vulnerability Management Problem., , , , , , , , , and . CoRR, (2023)Understanding the Security Risks of Docker Hub., , , , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 257-276. Springer, (2020)GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity., , , and . NDSS, The Internet Society, (2024)Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow., , , , , , , and . ESORICS (3), volume 14984 of Lecture Notes in Computer Science, page 194-214. Springer, (2024)