Yu Feng

Orcid: 0000-0003-1000-1229

Affiliations:
  • University of California, Santa Barbara, CA, USA
  • University of Texas at Austin, TX, USA (PhD 2018)


According to our database1, Yu Feng authored at least 45 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin.
IACR Cryptol. ePrint Arch., 2024

Push-Button Verification for BitVM Implementations.
IACR Cryptol. ePrint Arch., 2024

Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction.
IACR Cryptol. ePrint Arch., 2024

FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

<i>AuthSaber</i>: Automated Safety Verification of OpenID Connect Programs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Automated Detection of Under-Constrained Circuits in Zero-Knowledge Proofs.
Proc. ACM Program. Lang., 2023

Conflict-Driven Synthesis for Layout Engines.
Proc. ACM Program. Lang., 2023

Practical Security Analysis of Zero-Knowledge Proof Circuits.
IACR Cryptol. ePrint Arch., 2023

Automated Detection of Underconstrained Circuits for Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2023

Certifying Zero-Knowledge Circuits with Refinement Types.
IACR Cryptol. ePrint Arch., 2023

Fast and Reliable Program Synthesis via User Interaction.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
SolType: refinement types for arithmetic overflow in solidity.
Proc. ACM Program. Lang., 2022

Automated transpilation of imperative to functional code using neural-guided program synthesis.
Proc. ACM Program. Lang., 2022

Synthesis-powered optimization of smart contracts via data type refactoring.
Proc. ACM Program. Lang., 2022

Automated Transpilation of Imperative to Functional Code using Neural-Guided Program Synthesis (Extended Version).
CoRR, 2022

SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Visualization question answering using introspective program synthesis.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

Learning Contract Invariants Using Reinforcement Learning.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Tree traversal synthesis using domain-specific symbolic compilation.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations.
CoRR, 2021

SolType: Refinement Types for Solidity.
CoRR, 2021

Checking conformance of applications against GUI policies.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Falx: Synthesis-Powered Visualization Authoring.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Visualization by example.
Proc. ACM Program. Lang., 2020

Demystifying Loops in Smart Contracts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Summary-Based Symbolic Evaluation for Smart Contracts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Program Synthesis Using Deduction-Guided Reinforcement Learning.
Proceedings of the Computer Aided Verification - 32nd International Conference, 2020

2019
Trinity: An Extensible Synthesis Framework for Data Science.
Proc. VLDB Endow., 2019

Relational verification using reinforcement learning.
Proc. ACM Program. Lang., 2019

Precise Attack Synthesis for Smart Contracts.
CoRR, 2019

Maximal multi-layer specification synthesis.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2018
Singularity: pattern fuzzing for worst case complexity.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Program synthesis using conflict-driven learning.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

2017
Component-based synthesis for complex APIs.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

Component-based synthesis of table consolidation and transformation tasks from examples.
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017

Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Type-Directed Code Reuse using Integer Linear Programming.
CoRR, 2016

Hunter: next-generation code reuse for Java.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

2015
EXPLORER : query- and demand-driven exploration of interprocedural control flow properties.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

Bottom-Up Context-Sensitive Pointer Analysis for Java.
Proceedings of the Programming Languages and Systems - 13th Asian Symposium, 2015

2014
Apposcopy: automated detection of Android malware (invited talk).
Proceedings of the 2nd International Workshop on Software Development Lifecycle for Mobile, 2014

Apposcopy: semantics-based detection of Android malware through static analysis.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014


  Loading...