Author of the publication

Execution Generated Test Cases: How to Make Systems Code Crash Itself.

, and . SPIN, volume 3639 of Lecture Notes in Computer Science, page 2-23. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and flexible application-level networking on exokernel systems., , , , , and . ACM Trans. Comput. Syst., 20 (1): 49-83 (2002)Practical, Low-Effort Equivalence Verification of Real Code., and . CAV, volume 6806 of Lecture Notes in Computer Science, page 669-685. Springer, (2011)A few billion lines of code later: using static analysis to find bugs in the real world., , , , , , , , , and . Commun. ACM, 53 (2): 66-75 (2010)ASHs application-specific handlers for high-performance messaging., , and . IEEE/ACM Trans. Netw., 5 (4): 460-474 (1997)EXE: Automatically Generating Inputs of Death., , , , and . ACM Trans. Inf. Syst. Secur., 12 (2): 10:1-10:38 (2008)EXE: automatically generating inputs of death., , , , and . CCS, page 322-335. ACM, (2006)ASHs: Application-Specific Handlers for High-Performance Messaging., , and . SIGCOMM, page 40-52. ACM, (1996)RWset: Attacking Path Explosion in Constraint-Based Test Generation., , and . TACAS, volume 4963 of Lecture Notes in Computer Science, page 351-366. Springer, (2008)Under-Constrained Symbolic Execution: Correctness Checking for Real Code., and . USENIX Annual Technical Conference, USENIX Association, (2016)A simple method for extracting models for protocol code., , , and . ISCA, page 192-203. ACM, (2001)