Author of the publication

Analyzing Infrastructure as Code to Prevent Intra-update Sniping Vulnerabilities.

, , , and . TACAS (2), volume 12652 of Lecture Notes in Computer Science, page 105-123. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Automated Reasoning About Sets and Multisets with Cardinality Constraints.. IJCAR (1), volume 12166 of Lecture Notes in Computer Science, page 3-10. Springer, (2020)Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code., , , and . EuroS&P, page 687-706. IEEE, (2023)Decision Procedures for Program Synthesis and Verification.. EPFL, Switzerland, (2011)Synthesizing functional reactive programs., , , and . Haskell@ICFP, page 162-175. ACM, (2019)Formal XAI via Syntax-Guided Synthesis., , , , , , and . AISoLA, volume 14380 of Lecture Notes in Computer Science, page 119-137. Springer, (2023)PyDex: Repairing Bugs in Introductory Python Assignments using LLMs., , , , , , and . Proc. ACM Program. Lang., 8 (OOPSLA1): 1100-1124 (2024)Programming by Example: Efficient, but Not "Helpful"., , , and . PLATEAU@SPLASH, volume 67 of OASIcs, page 3:1-3:10. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Grammar Filtering for Syntax-Guided Synthesis., , , , and . AAAI, page 1611-1618. AAAI Press, (2020)Using pre-trained language models to resolve textual and semantic merge conflicts (experience paper)., , , , and . ISSTA, page 77-88. ACM, (2022)Analyzing Intentional Behavior in Autonomous Agents under Uncertainty., , , , , , , and . IJCAI, page 372-381. ijcai.org, (2023)