Author of the publication

Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments.

, , , and . SCAM, page 227-237. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source Forager: A Search Engine for Similar Source Code., , , , and . CoRR, (2017)Configurable and Sound Static Analysis of JavaScript: Techniques and Applications.. University of California, Santa Barbara, USA, (2014)base-search.net (ftcdlib:qt8xm5m45s).Automated Customized Bug-Benchmark Generation., , , , , , , , and . SCAM, page 103-114. IEEE, (2019)Caisson: a hardware description language for secure information flow., , , , , , and . PLDI, page 109-120. ACM, (2011)Sapper: a language for hardware-level security policy enforcement., , , , , , , , and . ASPLOS, page 97-112. ACM, (2014)JSAI: Designing a Sound, Configurable, and Efficient Static Analyzer for JavaScript., , , , , , , and . CoRR, (2014)Automated Customized Bug-Benchmark Generation., , , , , , and . CoRR, (2019)Position paper: Sapper - a language for provable hardware policy enforcement., , , , , , , , and . PLAS, page 39-44. ACM, (2013)Widening for Control-Flow., , , and . VMCAI, volume 8318 of Lecture Notes in Computer Science, page 472-491. Springer, (2014)MuSynth: Program Synthesis via Code Reuse and Code Manipulation., , , and . SSBSE, volume 10452 of Lecture Notes in Computer Science, page 117-123. Springer, (2017)