Qingkai Shi

Orcid: 0000-0002-8297-8998

According to our database1, Qingkai Shi authored at least 45 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing.
ACM Trans. Softw. Eng. Methodol., June, 2024

Balance Seed Scheduling via Monte Carlo Planning.
IEEE Trans. Dependable Secur. Comput., 2024

ParDiff: Practical Static Differential Analysis of Network Protocol Parsers.
Proc. ACM Program. Lang., 2024

Falcon: A Fused Approach to Path-Sensitive Sparse Data Dependence Analysis.
Proc. ACM Program. Lang., 2024

ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation.
CoRR, 2024

Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

A NAND Use Case for Cybersecurity Experiments.
Proceedings of the IEEE Secure Development Conference, 2024

FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation.
ACM Trans. Softw. Eng. Methodol., May, 2023

Extracting Protocol Format as State Machine via Controlled Static Loop Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Understanding Bugs in Rust Compilers.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Complexity-guided container replacement synthesis.
Proc. ACM Program. Lang., 2022

Indexing the extended Dyck-CFL reachability for context-sensitive program analysis.
Proc. ACM Program. Lang., 2022

BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Peahen: fast and precise static deadlock detection via context reduction.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Precise Divide-By-Zero Detection with Affirmative Evidence.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Program analysis via efficient symbolic abstraction.
Proc. ACM Program. Lang., 2021

Efficient Path-Sensitive Data-Dependence Analysis.
CoRR, 2021

Indexing Context-Sensitive Reachability.
CoRR, 2021

Skeletal approximation enumeration for SMT solver testing.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Path-sensitive sparse analysis without path conditions.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Fuzzing SMT solvers via two-dimensional input space exploration.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2020
Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Fast bit-vector satisfiability.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Test recommendation system based on slicing coverage filtering.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Functional code clone detection with syntax and semantics fusion learning.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Escaping dependency hell: finding build dependency errors with the unified dependency graph.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Pipelining bottom-up data flow analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Conquering the extensional scalability problem for value-flow analysis frameworks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
DeepGini: Prioritizing Massive Tests to Reduce Labeling Cost.
CoRR, 2019

NeuralVis: Visualizing and Interpreting Deep Learning Models.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Smoke: scalable path-sensitive memory leak detection for millions of lines of code.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Pinpoint: fast and precise sparse value flow analysis for million lines of code.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

2017
Predicate Interpretation Analysis Based on Soot.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Fault Interference and Coupling Effect.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

2016
Verifying Synchronization for Atomicity Violation Fixing.
IEEE Trans. Software Eng., 2016

Measuring the Diversity of a Test Set With Distance Entropy.
IEEE Trans. Reliab., 2016

2014
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Hybrid test data generation.
Proceedings of the 36th International Conference on Software Engineering, 2014


  Loading...