Xiangyu Zhang
Orcid: 0000-0002-9544-2500Affiliations:
- Purdue University, West Lafayette, IN, USA
- University of Arizona, Department of Computer Science, Tucson, AZ, USA (PhD 2006)
According to our database1,
Xiangyu Zhang
authored at least 297 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Self-Supervised Adversarial Training of Monocular Depth Estimation Against Physical-World Attacks.
IEEE Trans. Pattern Anal. Mach. Intell., December, 2024
IEEE Trans. Software Eng., November, 2024
DFuzzer: Diversity-Driven Seed Queue Construction of Fuzzing for Deep Learning Models.
IEEE Trans. Reliab., June, 2024
ACM Trans. Softw. Eng. Methodol., June, 2024
Proc. ACM Softw. Eng., 2024
Proc. ACM Program. Lang., 2024
CoRR, 2024
DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation.
CoRR, 2024
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia.
CoRR, 2024
CoRR, 2024
Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Secure Development Conference, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023
CoRR, 2023
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis.
CoRR, 2023
Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
RULER: discriminative and iterative adversarial training for deep neural network fairness.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Empir. Softw. Eng., 2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020
J. Syst. Softw., 2020
CoRR, 2020
CoRR, 2020
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
CPC: automatically classifying and propagating natural language comments via program analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019
Formal Methods Syst. Des., 2019
Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations.
CoRR, 2019
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
Proceedings of the 28th USENIX Security Symposium, 2019
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
SemCluster: clustering of imperative programming assignments based on quantitative semantic features.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Fault localisation for WS-BPEL programs based on predicate switching and program slicing.
J. Syst. Softw., 2018
Comput. Secur., 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
MODE: automated neural network model debugging via state differential analysis and input selection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-Precision Testing.
IEEE Trans. Software Eng., 2017
Inf. Softw. Technol., 2017
Int. J. Parallel Program., 2017
Z3str2: an efficient solver for strings, regular expressions, and length constraints.
Formal Methods Syst. Des., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Runtime Verification - 17th International Conference, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem.
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
PerfGuard: binary-centric application performance monitoring in production environments.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 25th ACM International Symposium on High-Performance Parallel and Distributed Computing, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Softw., 2015
J. Comput. Sci. Technol., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Proceedings of the 10th ACM Symposium on Information, 2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Effective Search-Space Pruning for Solvers of String Equations, Regular Expressions and Length Constraints.
Proceedings of the Computer Aided Verification - 27th International Conference, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
ACM Trans. Softw. Eng. Methodol., 2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014
Proceedings of the International Symposium on Software Testing and Analysis, 2014
Proceedings of the 36th International Conference on Software Engineering, 2014
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Path sensitive static analysis of web applications for remote code execution vulnerability detection.
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 35th International Conference on Software Engineering, 2013
BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IntroLib: Efficient and transparent library call introspection for malware forensics.
Digit. Investig., 2012
Proceedings of the 19th Working Conference on Reverse Engineering, 2012
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Accentuating the positive: atomicity inference and enforcement using correct executions.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications.
IEEE Trans. Software Eng., 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010
2009
Proceedings of the Fourth International Workshop on Middleware for Sensor Networks, 2009
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009
Proceedings of the Fundamental Approaches to Software Engineering, 2009
Proceedings of the CGO 2009, 2009
2008
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008
Proceedings of the 13th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2008
Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
2007
Empir. Softw. Eng., 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2007
Enabling tracing Of long-running multithreaded programs via dynamic execution reduction.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2007
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
Whole Execution Traces and Their Use in Debugging.
Proceedings of the Compiler Design Handbook: Optimizations and Machine Code Generation, 2007
2006
Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2006
Proceedings of the ACM SIGPLAN 2006 Conference on Programming Language Design and Implementation, 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
2005
ACM Trans. Program. Lang. Syst., 2005
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005
Proceedings of the 11th International Conference on High-Performance Computer Architecture (HPCA-11 2005), 2005
Proceedings of the Sixth International Workshop on Automated Debugging, 2005
Proceedings of the 14th International Conference on Parallel Architectures and Compilation Techniques (PACT 2005), 2005
2004
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004
Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004
Proceedings of the 2nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2004), 2004
2003
Proceedings of the 25th International Conference on Software Engineering, 2003
Proceedings of the 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 2003