Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static deep error checking in large system applications using parfait., , , , , , , , , and . SIGSOFT FSE, page 432-435. ACM, (2011)Boosting the performance of flow-sensitive points-to analysis using value flow., , and . SIGSOFT FSE, page 343-353. ACM, (2011)Transitioning Parfait into a Development Tool., , , , and . IEEE Secur. Priv., 10 (3): 16-23 (2012)Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform., , and . SOAP@PLDI, page 7-12. ACM, (2015)Precise and scalable context-sensitive pointer analysis via value flow graph., , and . ISMM, page 85-96. ACM, (2013)Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions., , , , and . SecDev, page 134. IEEE Computer Society, (2018)Program analysis for bug detection using parfait: invited talk., , , and . PEPM, page 7-8. ACM, (2009)Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk)., and . APLAS, volume 8301 of Lecture Notes in Computer Science, page 172-175. Springer, (2013)Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases., , , , , and . CoRR, (2020)Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding., , , , , , , , , and 5 other author(s). IEEE Secur. Priv., 20 (6): 43-52 (2022)