Author of the publication

Static Analysis versus Software Model Checking for Bug Finding.

, and . VMCAI, volume 2937 of Lecture Notes in Computer Science, page 191-210. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EXE: Automatically Generating Inputs of Death., , , , and . ACM Trans. Inf. Syst. Secur., 12 (2): 10:1-10:38 (2008)ASHs application-specific handlers for high-performance messaging., , and . IEEE/ACM Trans. Netw., 5 (4): 460-474 (1997)Fast and flexible application-level networking on exokernel systems., , , , , and . ACM Trans. Comput. Syst., 20 (1): 49-83 (2002)A few billion lines of code later: using static analysis to find bugs in the real world., , , , , , , , , and . Commun. ACM, 53 (2): 66-75 (2010)Practical, Low-Effort Equivalence Verification of Real Code., and . CAV, volume 6806 of Lecture Notes in Computer Science, page 669-685. Springer, (2011)ASHs: Application-Specific Handlers for High-Performance Messaging., , and . SIGCOMM, page 40-52. ACM, (1996)RWset: Attacking Path Explosion in Constraint-Based Test Generation., , and . TACAS, volume 4963 of Lecture Notes in Computer Science, page 351-366. Springer, (2008)A simple method for extracting models for protocol code., , , and . ISCA, page 192-203. ACM, (2001)EXE: automatically generating inputs of death., , , , and . CCS, page 322-335. ACM, (2006)Under-Constrained Symbolic Execution: Correctness Checking for Real Code., and . USENIX Annual Technical Conference, USENIX Association, (2016)