Author of the publication

A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis.

, , , , , , and . Proc. ACM Program. Lang., 7 (OOPSLA2): 971-1000 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis., , , , , , and . Proc. ACM Program. Lang., 7 (OOPSLA2): 971-1000 (October 2023)Every Mutation Should Be Rewarded: Boosting Fault Localization with Mutated Predicates., , and . ICSME, page 196-207. IEEE, (2020)Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis., , , , , and . SAS, volume 11822 of Lecture Notes in Computer Science, page 48-72. Springer, (2019)TCD: Statically Detecting Type Confusion Errors in C++ Programs., , , and . ISSRE, page 292-302. IEEE, (2019)Practical Software-Based Shadow Stacks on x86-64., , and . ACM Trans. Archit. Code Optim., 19 (4): 61:1-61:26 (2022)Differential Refractive Index Sensor Based on Coupled Plasmon Waveguide Resonance in the C-Band., , , , , , , , , and . Sensors, 21 (23): 7984 (2021)Software-Based Techniques for Protecting Return Addresses.. University of New South Wales, Sydney, Australia, (2021)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/71208).Buddy Stacks: Protecting Return Addresses with Efficient Thread-Local Storage and Runtime Re-Randomization., , , and . ACM Trans. Softw. Eng. Methodol., 31 (2): 35e:1-35e:37 (2022)Burn after reading: a shadow stack with microsecond-level runtime rerandomization for protecting return addresses., and . ICSE, page 258-270. ACM, (2020)