Author of the publication

Bugs as deviant behavior: a general approach to inferring errors in systems code

, , , , and . SIGOPS Oper. Syst. Rev., 35 (5): 57--72 (October 2001)
DOI: 10.1145/502059.502041

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Build Static Checking Systems Using Orders of Magnitude Less Code, , and . SIGPLAN Not., 51 (4): 143--157 (March 2016)A few billion lines of code later: using static analysis to find bugs in the real world, , , , , , , , , and . Communications of the ACM, 53 (2): 66-75 (2010)Bugs as deviant behavior: a general approach to inferring errors in systems code, , , , and . SIGOPS Oper. Syst. Rev., 35 (5): 57--72 (October 2001)RWset: Attacking Path Explosion in Constraint-Based Test Generation., , and . TACAS, volume 4963 of Lecture Notes in Computer Science, page 351-366. Springer, (2008)A simple method for extracting models for protocol code., , , and . ISCA, page 192-203. ACM, (2001)ASHs: Application-Specific Handlers for High-Performance Messaging., , and . SIGCOMM, page 40-52. ACM, (1996)Practical, Low-Effort Equivalence Verification of Real Code., and . CAV, volume 6806 of Lecture Notes in Computer Science, page 669-685. Springer, (2011)EXE: automatically generating inputs of death., , , , and . CCS, page 322-335. ACM, (2006)Under-Constrained Symbolic Execution: Correctness Checking for Real Code., and . USENIX ATC, USENIX Association, (2016)Model Checking Large Network Protocol Implementations., and . NSDI, page 155-168. USENIX, (2004)