Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Echidna: effective, usable, and fast fuzzing for smart contracts., , , , and . ISSTA, page 557-560. ACM, (2020)What are the Actual Flaws in Important Smart Contracts (And How Can We Find Them)?, , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 634-653. Springer, (2020)Slither: a static analysis framework for smart contracts., , and . WETSEB@ICSE, page 8-15. IEEE / ACM, (2019)Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities., , , and . ISSTA, page 133-143. ACM, (2012)Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump., , and . APSEC, page 239-248. IEEE Computer Society, (2017)echidna-parade: a tool for diverse multicore smart contract fuzzing., and . ISSTA, page 658-661. ACM, (2021)Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts., , , , , , , and . ASE, page 1186-1189. IEEE, (2019)Toward Smarter Vulnerability Discovery Using Machine Learning., and . AISec@CCS, page 48-56. ACM, (2018)Tutorial: DeepState: Bringing Vulnerability Detection Tools into the Development Cycle., , and . SecDev, page 130-131. IEEE Computer Society, (2018)What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?, , , and . CoRR, (2019)