Tuba Yavuz

Orcid: 0000-0002-5542-2142

Affiliations:
  • University of Florida, Gainesville, FL, USA


According to our database1, Tuba Yavuz authored at least 40 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Pass Targeted Dynamic Symbolic Execution.
CoRR, 2024

Generating Maximal Configurations and Their Variants Using Code Metrics.
CoRR, 2024

Detecting Hardware Trojans using Model Guided Symbolic Execution.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

DTjRTL: A Configurable Framework for Automated Hardware Trojan Insertion at RTL.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions.
ACM Trans. Design Autom. Electr. Syst., March, 2023

ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs.
IEEE Trans. Dependable Secur. Comput., 2023

VGF: Value-Guided Fuzzing - Fuzzing Hardware as Hardware.
CoRR, 2023

MMIO Access-Based Coverage for Firmware Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
SIFT: A Tool for Property Directed Symbolic Execution of Multithreaded Software.
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022

Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

Security Analysis of IoT Frameworks using Static Taint Analysis.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

A Study on the Testing of Android Security Patches.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
ProXray: Protocol Model Learning and Guided Firmware Analysis.
IEEE Trans. Software Eng., 2021

Learning Feature Interactions With and Without Specifications.
CoRR, 2021

Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021

SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations.
Proceedings of the MEMOCODE '21: 19th ACM-IEEE International Conference on Formal Methods and Models for System Design, Virtual Event, China, November 20, 2021

2020
Partial predicate abstraction and counter-example guided refinement.
J. Log. Algebraic Methods Program., 2020

Analyzing system software components using API model guided symbolic execution.
Autom. Softw. Eng., 2020

Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Verifying Absence of Hardware-Software Data Races using Counting Abstraction.
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020

2019
Toward Automated Firmware Analysis in the IoT Era.
IEEE Secur. Priv., 2019

Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

2018
Detecting potential deadlocks through change impact analysis.
Softw. Qual. J., 2018

Heuristics for Selecting Predicates for Partial Predicate Abstraction.
CoRR, 2018

2017
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Combining Predicate Abstraction with Fixpoint Approximations.
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016

Specification, verification, and synthesis using extended state machines with callbacks.
Proceedings of the 2016 ACM/IEEE International Conference on Formal Methods and Models for System Design, 2016

Extracting configuration parameter interactions using static analysis.
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016

2012
JRF-E: using model checking to give advice on eliminating memory model-related bugs.
Autom. Softw. Eng., 2012

Java Memory Model-Aware Model Checking.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

2009
Action Language verifier: an infinite-state model checker for reactive software specifications.
Formal Methods Syst. Des., 2009

Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking.
Proceedings of the ASE 2009, 2009

2005
Verification of parameterized hierarchical state machines using action language verifier.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005

Action Language Verifier, Extended.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2003
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types.
Int. J. Softw. Tools Technol. Transf., 2003

2002
Automated Verification of Concurrent Linked Lists with Counters.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Specification, verification, and synthesis of concurrency control components.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

Heuristics for Efficient Manipulation of Composite Constraints.
Proceedings of the Frontiers of Combining Systems, 4th International Workshop, 2002

2001
A Library for Composite Symbolic Representations.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001

Action Language Verifier.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001


  Loading...