Author of the publication

Skeletal approximation enumeration for SMT solver testing.

, , , , , and . ESEC/SIGSOFT FSE, page 1141-1153. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks., , , , , and . ISSTA, page 177-188. ACM, (2020)PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model., , , , , , , , , and . ESEC/SIGSOFT FSE, page 401-412. ACM, (2023)BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning., , , , , and . SP, page 36-50. IEEE, (2022)ParDiff: Practical Static Differential Analysis of Network Protocol Parsers., , , , , , , and . Proc. ACM Program. Lang., 8 (OOPSLA1): 1208-1234 (2024)Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts., , , , , , , and . SP, page 2198-2216. IEEE, (2024)Lifting Network Protocol Implementation to Precise Format Specification with Security Applications., , , , and . CCS, page 1287-1301. ACM, (2023)Functional code clone detection with syntax and semantics fusion learning., , , , and . ISSTA, page 516-527. ACM, (2020)Smoke: scalable path-sensitive memory leak detection for millions of lines of code., , , , , and . ICSE, page 72-82. IEEE / ACM, (2019)Escaping dependency hell: finding build dependency errors with the unified dependency graph., , , , , and . ISSTA, page 463-474. ACM, (2020)Complexity-guided container replacement synthesis., , , , and . Proc. ACM Program. Lang., 6 (OOPSLA1): 1-31 (2022)