Author of the publication

VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery.

, , , and . IEEE Symposium on Security and Privacy, page 595-614. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities., , , , and . USENIX Security Symposium, page 3041-3058. USENIX Association, (2021)Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions., , and . ACSAC, page 194-206. ACM, (2021)VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery., , , and . IEEE Symposium on Security and Privacy, page 595-614. IEEE Computer Society, (2017)Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites., , , , and . IEEE Access, (2022)L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing., , , and . DSN, page 343-354. IEEE, (2022)Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse., , , , and . ICSE, page 860-872. IEEE, (2021)OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept., , , and . DSN, page 174-185. IEEE, (2021)CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components., , , and . ICSE, page 236:1-236:12. ACM, (2024)xVDB: A High-Coverage Approach for Constructing a Vulnerability Database., , , , and . IEEE Access, (2022)ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol., , , and . IEEE Access, (2023)