Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Under-constrained symbolic execution : correctness checking for real code.. Stanford University, USA, (2015)Practical, Low-Effort Equivalence Verification of Real Code., and . CAV, volume 6806 of Lecture Notes in Computer Science, page 669-685. Springer, (2011)Testudo: Heavyweight security analysis via statistical sampling., , , , , , and . MICRO, page 117-128. IEEE Computer Society, (2008)Under-Constrained Symbolic Execution: Correctness Checking for Real Code., and . USENIX Annual Technical Conference, USENIX Association, (2016)Under-Constrained Symbolic Execution: Correctness Checking for Real Code., and . USENIX Security Symposium, page 49-64. USENIX Association, (2015)