Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Customized Bug-Benchmark Generation., , , , , , , , and . SCAM, page 103-114. IEEE, (2019)To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing., , , , , , , , and . EDCC, page 238-249. IEEE Computer Society, (2014)MuSynth: Program Synthesis via Code Reuse and Code Manipulation., , , and . SSBSE, volume 10452 of Lecture Notes in Computer Science, page 117-123. Springer, (2017)Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery., , , , , and . ICSE (1), page 145-155. IEEE Computer Society, (2015)Vertx: Automated Validation of Binary Transformations., , and . FEAST@CCS, page 1-7. ACM, (2017)Source Forager: A Search Engine for Similar Source Code., , , , and . CoRR, (2017)WYSINWYX: What You See Is Not What You eXecute., , , and . VSTTE, volume 4171 of Lecture Notes in Computer Science, page 202-213. Springer, (2005)Interconveritibility of Set Constraints and Context-Free Language Reachability., and . PEPM, page 74-89. ACM, (1997)Automated Customized Bug-Benchmark Generation., , , , , , and . CoRR, (2019)The Interprocedural Express-Lane Transformation., and . CC, volume 2622 of Lecture Notes in Computer Science, page 200-216. Springer, (2003)