Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making symbolic execution promising by learning aggressive state-pruning strategy., and . ESEC/SIGSOFT FSE, page 147-158. ACM, (2020)Automatic diagnosis and correction of logical errors for functional programming assignments., , , and . Proc. ACM Program. Lang., 2 (OOPSLA): 158:1-158:30 (2018)Automated Source Code Instrumentation for Verifying Potential Vulnerabilities., , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 211-226. Springer, (2016)Selective context-sensitivity guided by impact pre-analysis., , , , and . PLDI, page 475-484. ACM, (2014)Access-based abstract memory localization in static analysis., and . Sci. Comput. Program., 78 (9): 1701-1727 (2013)Access Analysis-Based Tight Localization of Abstract Memories., , and . VMCAI, volume 6538 of Lecture Notes in Computer Science, page 356-370. Springer, (2011)Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation.. APLAS, volume 5904 of Lecture Notes in Computer Science, page 14-29. Springer, (2009)Synthesizing Imperative Programs from Examples Guided by Static Analysis., and . SAS, volume 10422 of Lecture Notes in Computer Science, page 364-381. Springer, (2017)V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques., , , and . USENIX Security Symposium, page 6541-6556. USENIX Association, (2023)Synthesizing regular expressions from examples for introductory automata assignments., , and . GPCE, page 70-80. ACM, (2016)