Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High coverage testing of Haskell programs., , and . ISSTA, page 375-385. ACM, (2011)A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)., , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?, , and . TAP@FM, volume 11823 of Lecture Notes in Computer Science, page 41-54. Springer, (2019)Chopped symbolic execution., , , and . ICSE, page 350-360. ACM, (2018)A Deterministic Memory Allocator for Dynamic Symbolic Execution., , , , and . ECOOP, volume 222 of LIPIcs, page 9:1-9:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)SaBRe: load-time selective binary rewriting., , , , , , and . Int. J. Softw. Tools Technol. Transf., 24 (2): 205-223 (2022)Compiler fuzzing: how much does it matter?, , , and . Proc. ACM Program. Lang., 3 (OOPSLA): 155:1-155:29 (2019)VARAN the Unbelievable: An Efficient N-version Execution Framework., and . ASPLOS, page 339-353. ACM, (2015)Safe software updates via multi-version execution., and . ICSE, page 612-621. IEEE Computer Society, (2013)Computing summaries of string loops in C for better testing and refactoring., , , , and . PLDI, page 874-888. ACM, (2019)