Author of the publication

Locating vulnerabilities in binaries via memory layout recovering.

, , , , , , , and . ESEC/SIGSOFT FSE, page 718-728. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Soundness Proof of Region-Based Memory Management for Object-Oriented Paradigm., , and . ICFEM, volume 5256 of Lecture Notes in Computer Science, page 126-146. Springer, (2008)A Specialization Calculus for Pruning Disjunctive Predicates to Support Verification., , , , , and . CAV, volume 6806 of Lecture Notes in Computer Science, page 293-309. Springer, (2011)Automated Modular Verification for Relaxed Communication Protocols., , , and . APLAS, volume 11275 of Lecture Notes in Computer Science, page 284-305. Springer, (2018)Language Inclusion Checking of Timed Automata with Non-Zenoness., , , and . IEEE Trans. Software Eng., 43 (11): 995-1008 (2017)基于UPPAAL的WSNs数据收集协议的建模与分析 (Modeling and Analyzing of WSNs Data Gathering Protocol Based on UPPAAL)., , , , and . 计算机科学, 43 (9): 124-130 (2016)Preface., , and . J. Comput. Sci. Technol., 36 (6): 1229-1230 (2021)Termination and non-termination specification inference., , and . PLDI, page 489-498. ACM, (2015)A UTP semantics for communicating processes with shared variables and its formal encoding in PVS., , , , , and . Formal Aspects Comput., 30 (3-4): 351-380 (2018)Preface to Special Issue on Analysis and Verification of Intelligent Systems., , and . Int. J. Softw. Informatics, 12 (4): 351-353 (2022)Automatically 'Verifying' Discrete-Time Complex Systems through Learning, Abstraction and Refinement., , , and . IEEE Trans. Software Eng., 47 (1): 189-203 (2021)