Author of the publication

WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection.

, , , , and . QRS, page 926-937. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A web search-centric approach to recommender systems with URLs as minimal user contexts., , and . J. Syst. Softw., 84 (6): 930-941 (2011)Leveraging Performance and Power Savings for Embedded Systems Using Multiple Target Deadlines., , and . QSIC, page 473-480. IEEE Computer Society, (2010)Tag-Based Techniques for Black-Box Test Case Prioritization for Service Testing., , , and . QSIC, page 21-30. IEEE Computer Society, (2009)MagicFuzzer: Scalable deadlock detection for large-scale applications., and . ICSE, page 606-616. IEEE Computer Society, (2012)Testing pervasive software in the presence of context inconsistency resolution services., , and . ICSE, page 61-70. ACM, (2008)Magiclock: Scalable Detection ofPotential Deadlocks in Large-ScaleMultithreaded Programs., and . IEEE Trans. Software Eng., 40 (3): 266-281 (2014)A Study on the Efficiency Aspect of Data Race Detection: A Compiler Optimization Level Perspective., and . QSIC, page 35-44. IEEE, (2013)Optimal Multiresolution Polygonal Approximation., and . COCOON, volume 1276 of Lecture Notes in Computer Science, page 32-41. Springer, (1997)Facilitating Monkey Test by Detecting Operable Regions in Rendered GUI of Mobile Game Apps., , , and . QRS, page 298-306. IEEE, (2016)Accuracy Graphs of Spectrum-Based Fault Localization Formulas., , , and . IEEE Trans. Reliability, 66 (2): 403-424 (2017)