Author of the publication

Path-Sensitive Data Flow Analysis Simplified.

, , , , , and . ICFEM, volume 8144 of Lecture Notes in Computer Science, page 415-430. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting the performance of flow-sensitive points-to analysis using value flow., , and . SIGSOFT FSE, page 343-353. ACM, (2011)Static deep error checking in large system applications using parfait., , , , , , , , , and . SIGSOFT FSE, page 432-435. ACM, (2011)Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform., , and . SOAP@PLDI, page 7-12. ACM, (2015)Precise and scalable context-sensitive pointer analysis via value flow graph., , and . ISMM, page 85-96. ACM, (2013)Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions., , , , and . SecDev, page 134. IEEE Computer Society, (2018)Program analysis for bug detection using parfait: invited talk., , , and . PEPM, page 7-8. ACM, (2009)Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk)., and . APLAS, volume 8301 of Lecture Notes in Computer Science, page 172-175. Springer, (2013)Industrial Strength Static Detection for Cryptographic API Misuses., , , , , and . SecDev, page 61-62. IEEE, (2022)Practical and effective symbolic analysis for buffer overflow detection., , and . SIGSOFT FSE, page 317-326. ACM, (2010)