From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Static deep error checking in large system applications using parfait., , , , , , , , , и . SIGSOFT FSE, стр. 432-435. ACM, (2011)Boosting the performance of flow-sensitive points-to analysis using value flow., , и . SIGSOFT FSE, стр. 343-353. ACM, (2011)Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform., , и . SOAP@PLDI, стр. 7-12. ACM, (2015)Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions., , , , и . SecDev, стр. 134. IEEE Computer Society, (2018)Precise and scalable context-sensitive pointer analysis via value flow graph., , и . ISMM, стр. 85-96. ACM, (2013)Program analysis for bug detection using parfait: invited talk., , , и . PEPM, стр. 7-8. ACM, (2009)Internal Deployment of the Parfait Static Code Analysis Tool at Oracle - (Invited Talk)., и . APLAS, том 8301 из Lecture Notes in Computer Science, стр. 172-175. Springer, (2013)Practical and effective symbolic analysis for buffer overflow detection., , и . SIGSOFT FSE, стр. 317-326. ACM, (2010)Industrial Strength Static Detection for Cryptographic API Misuses., , , , , и . SecDev, стр. 61-62. IEEE, (2022)