Kostyantyn Vorobyov

Orcid: 0000-0003-2443-4949

According to our database1, Kostyantyn Vorobyov authored at least 15 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthesis of Allowlists for Runtime Protection against SQLi.
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 2024

2023
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
Synthesis of Java Deserialisation Filters from Examples.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Scalable string analysis: an experience report.
Proceedings of the SOAP@PLDI 2021: Proceedings of the 10th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, 2021

MoScan: a model-based vulnerability scanner for web single sign-on services.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2018
Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report.
Proceedings of the Tests and Proofs - 12th International Conference, 2018

2017
Runtime Detection of Temporal Memory Errors.
Proceedings of the Runtime Verification - 17th International Conference, 2017

E-ACSL, a Runtime Verification Tool for Safety and Security of C Programs (tool paper).
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017

Shadow state encoding for efficient monitoring of block-level properties.
Proceedings of the 2017 ACM SIGPLAN International Symposium on Memory Management, 2017

2016
A low-overhead, value-tracking approach to information flow security.
Inf. Softw. Technol., 2016

2015
Enforcement of privacy requirements.
Comput. Secur., 2015

A concise specification language for trace monitoring.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

A Datalog Source-to-Source Translator for Static Program Analysis: An Experience Report.
Proceedings of the 24th Australasian Software Engineering Conference, 2015

2013
A Dynamic Approach to Locating Memory Leaks.
Proceedings of the Testing Software and Systems, 2013

2012
Combining Static Analysis and Constraint Solving for Automatic Test Case Generation.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012


  Loading...