Tuba Yavuz
Orcid: 0000-0002-5542-2142Affiliations:
- University of Florida, Gainesville, FL, USA
According to our database1,
Tuba Yavuz
authored at least 40 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024
2023
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions.
ACM Trans. Design Autom. Electr. Syst., March, 2023
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
IEEE Trans. Software Eng., 2021
Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations.
Proceedings of the MEMOCODE '21: 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, Virtual Event, China, November 20, 2021
2020
J. Log. Algebraic Methods Program., 2020
Autom. Softw. Eng., 2020
Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020
2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016
Specification, verification, and synthesis using extended state machines with callbacks.
Proceedings of the 2016 ACM/IEEE International Conference on Formal Methods and Models for System Design, 2016
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016
2012
Autom. Softw. Eng., 2012
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
2009
Action Language verifier: an infinite-state model checker for reactive software specifications.
Formal Methods Syst. Des., 2009
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking.
Proceedings of the ASE 2009, 2009
2005
Verification of parameterized hierarchical state machines using action language verifier.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
2003
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types.
Int. J. Softw. Tools Technol. Transf., 2003
2002
Proceedings of the Static Analysis, 9th International Symposium, 2002
Proceedings of the International Symposium on Software Testing and Analysis, 2002
Proceedings of the Frontiers of Combining Systems, 4th International Workshop, 2002
2001
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001