Author of the publication

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification.

, , , , , and . CAV (2), volume 10427 of Lecture Notes in Computer Science, page 453-474. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic exploit generation., , , , , and . Commun. ACM, 57 (2): 74-84 (2014)Requirements for Root of Trust Establishment., and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 192-202. Springer, (2018)BYTEWEIGHT: Learning to Recognize Functions in Binary Code., , , , and . USENIX Security Symposium, page 845-860. USENIX Association, (2014)Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification., , , , , and . CAV (2), volume 10427 of Lecture Notes in Computer Science, page 453-474. Springer, (2017)Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components., , , and . USENIX Security Symposium, page 303-317. USENIX Association, (2014)Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring., , , and . USENIX Security Symposium, page 353-368. USENIX Association, (2013)Program-Adaptive Mutational Fuzzing., , and . IEEE Symposium on Security and Privacy, page 725-741. IEEE Computer Society, (2015)Mutual Embeddings., , , , and . J. Interconnect. Networks, 15 (1-2): 1550001:1-1550001:27 (2015)Scheduling black-box mutational fuzzing., , , and . ACM Conference on Computer and Communications Security, page 511-522. ACM, (2013)Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors., , , and . CCCG, (2008)