Author of the publication

A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors).

, , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CsmithEdge: more effective compiler testing by handling undefined behaviour less conservatively., , and . Empir. Softw. Eng., 27 (6): 129 (2022)SnapFuzz: An Efficient Fuzzing Framework for Network Applications., and . CoRR, (2022)A Deterministic Memory Allocator for Dynamic Symbolic Execution., , , , and . ECOOP, volume 222 of LIPIcs, page 9:1-9:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Chopped symbolic execution., , , and . ICSE, page 350-360. ACM, (2018)High coverage testing of Haskell programs., , and . ISSTA, page 375-385. ACM, (2011)Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?, , and . TAP@FM, volume 11823 of Lecture Notes in Computer Science, page 41-54. Springer, (2019)A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)., , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)Symbolic execution for software testing: three decades later., and . Commun. ACM, 56 (2): 82-90 (2013)Symbolic Testing of OpenCL Code., , and . Haifa Verification Conference, volume 7261 of Lecture Notes in Computer Science, page 203-218. Springer, (2011)Compiler fuzzing: how much does it matter?, , , and . Proc. ACM Program. Lang., 3 (OOPSLA): 155:1-155:29 (2019)