Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Precise and scalable points-to analysis via data-driven context tunneling., , and . Proc. ACM Program. Lang., 2 (OOPSLA): 140:1-140:29 (2018)Data-driven context-sensitivity for points-to analysis., , , and . Proc. ACM Program. Lang., 1 (OOPSLA): 100:1-100:28 (2017)Synthesizing Imperative Programs from Examples Guided by Static Analysis., and . SAS, volume 10422 of Lecture Notes in Computer Science, page 364-381. Springer, (2017)Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation.. APLAS, volume 5904 of Lecture Notes in Computer Science, page 14-29. Springer, (2009)VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts., , , , and . CoRR, (2019)V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques., , , and . USENIX Security Symposium, page 6541-6556. USENIX Association, (2023)Synthesizing regular expressions from examples for introductory automata assignments., , and . GPCE, page 70-80. ACM, (2016)MemFix: static analysis-based repair of memory deallocation errors for C., , and . ESEC/SIGSOFT FSE, page 95-106. ACM, (2018)SYMTUNER: Maximizing the Power of Symbolic Execution by Adaptively Tuning External Parameters., , , and . ICSE, page 2068-2079. ACM, (2022)Selective X-Sensitive Analysis Guided by Impact Pre-Analysis., , , , and . ACM Trans. Program. Lang. Syst., 38 (2): 6:1-6:45 (2016)