Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aliasing Limits on Translating C to Safe Rust., , , , , and . Proc. ACM Program. Lang., 7 (OOPSLA1): 551-579 (April 2023)String Abstractions for String Verification., , and . SPIN, volume 6823 of Lecture Notes in Computer Science, page 20-37. Springer, (2011)An Architecture for Analysis., , , , , , and . IEEE Micro, 38 (3): 107-115 (2018)Language fuzzing using constraint logic programming., , and . ASE, page 725-730. ACM, (2014)Fixpoint reuse for incremental JavaScript analysis., , and . SOAP@PLDI, page 2-7. ACM, (2019)Loop Rerolling for Hardware Decompilation., , , and . Proc. ACM Program. Lang., 7 (PLDI): 420-442 (2023)Caisson: a hardware description language for secure information flow., , , , , , and . PLDI, page 109-120. ACM, (2011)The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code., and . PLDI, page 290-299. ACM, (2007)Bouncer: static program analysis in hardware., , , , and . ISCA, page 711-722. ACM, (2019)Sapper: a language for hardware-level security policy enforcement., , , , , , , , and . ASPLOS, page 97-112. ACM, (2014)