Edward J. Schwartz

Orcid: 0000-0003-0094-4805

According to our database1, Edward J. Schwartz authored at least 24 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
STRIDE: Simple Type Recognition In Decompiled Executables.
CoRR, 2024

A Taxonomy of C Decompiler Fidelity Issues.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class.
ACM Trans. Softw. Eng. Methodol., April, 2023

2022
Augmenting Decompiler Output with Learned Variable Names and Types.
Proceedings of the 31st USENIX Security Symposium, 2022

VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
The Art, Science, and Engineering of Fuzzing: A Survey.
IEEE Trans. Software Eng., 2021

Learning to Superoptimize Real-world Programs.
CoRR, 2021

2020
A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
DIRE: A Neural Approach to Decompiled Identifier Naming.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2018
Fuzzing: Art, Science, and Engineering.
CoRR, 2018

Executable Counterexamples in Software Model Checking.
Proceedings of the Verified Software. Theories, Tools, and Experiments, 2018

Meaningful variable names for decompiled code: a machine translation approach.
Proceedings of the 26th Conference on Program Comprehension, 2018

Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2016
Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

2014
Abstraction Recovery for Scalable Static Binary Analysis.
PhD thesis, 2014

Automatic exploit generation.
Commun. ACM, 2014

2013
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2011
The Danger of Unrandomized Code.
login Usenix Mag., 2011

Q: Exploit Hardening Made Easy.
Proceedings of the 20th USENIX Security Symposium, 2011

BAP: A Binary Analysis Platform.
Proceedings of the Computer Aided Verification - 23rd International Conference, 2011

2010
How to model a TCP/IP network using only 20 parameters.
Proceedings of the 2010 Winter Simulation Conference, 2010

All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Contractual Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010


  Loading...