Author of the publication

BLISS: Improved Symbolic Execution by Bounded Lazy Initialization with SAT Support.

, , , , and . IEEE Trans. Software Eng., 41 (7): 639-660 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations., , and . EuroS&P, page 307-322. IEEE, (2018)JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation., , and . SP, page 1207-1222. IEEE, (2020)Parallel bounded analysis in code with rich invariants by refinement of field bounds., , , , , , , and . ISSTA, page 23-33. ACM, (2013)TACO: Efficient SAT-Based Bounded Verification Using Symmetry Breaking and Tight Bounds., , , and . IEEE Trans. Software Eng., 39 (9): 1283-1307 (2013)ParAlloy: Towards a Framework for Efficient Parallel Analysis of Alloy Models., , , and . ASM, volume 5977 of Lecture Notes in Computer Science, page 396-397. Springer, (2010)Profit: Detecting and Quantifying Side Channels in Networked Applications., , , and . NDSS, The Internet Society, (2019)Efficient Bounded Model Checking of Heap-Manipulating Programs using Tight Field Bounds., , , , , and . FASE, volume 12649 of Lecture Notes in Computer Science, page 218-239. Springer, (2021)RAPID: checking API usage for the cloud in the cloud., , , , , , , and . ESEC/SIGSOFT FSE, page 1416-1426. ACM, (2021)Compositional Taint Analysis for Enforcing Security Policies at Scale., , , , , , , , , and 2 other author(s). ESEC/SIGSOFT FSE, page 1985-1996. ACM, (2023)Inductive verification of data model invariants in web applications using first-order logic., , and . Autom. Softw. Eng., 26 (2): 379-416 (2019)