WASAI: uncovering vulnerabilities in Wasm smart contracts | | 2022 | 0 |
Push-button synthesis of watch companions for Android apps | | 2022 | |
Quantifying permissiveness of access control policies | | 2022 | 0 |
Hiding critical program components via ambiguous translation | | 2022 | 1 |
RunTime-assisted convergence in replicated data types | | 2022 | |
LEGenT: Localizing Errors and Generating Testcases for CS1 | | 2022 | |
Projection-compliant database generation | Proceedings of the VLDB Endowment | 2022 | |
A Survey on String Constraint Solving | ACM Computing Surveys | 2023 | 4 |
Better Counterexamples for Dafny | Lecture Notes in Computer Science | 2022 | 2 |
P1OVD: Patch-Based 1-Day Out-of-Bounds Vulnerabilities Detection Tool for Downstream Binaries | Electronics (Switzerland) | 2022 | |
High Assurance Software for Financial Regulation and Business Platforms | Lecture Notes in Computer Science | 2022 | 1 |
Synthesis of state machine models | | 2020 | 0 |
Bounded Verification of State Machine Models | | 2020 | |
Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution | Advances in Intelligent Systems and Computing | 2021 | |
Protocol Analysis with Time | Lecture Notes in Computer Science | 2020 | 2 |
SMT-based verification of temporal properties for component-based software systems | IFAC-PapersOnLine | 2020 | 0 |
Incremental Methods for Checking Real-Time Consistency | Lecture Notes in Computer Science | 2020 | 2 |
Our Approach to Formal Verification of Token Economy Models | Communications in Computer and Information Science | 2020 | 1 |
RustHorn: CHC-based Verification for Rust Programs | ACM Transactions on Programming Languages and Systems | 2021 | 3 |
Themis | | 2021 | 0 |
Have I Been Exploited? | Lecture Notes in Computer Science | 2020 | |
Principled Unearthing of TCP Side Channel Vulnerabilities | | 2019 | 4 |
Automated verification of query equivalence using satisfiability modulo theories | Proceedings of the VLDB Endowment | 2019 | 4 |
Applying an SMT Solver to Coverage-Driven Design Verification | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2018 | |
Co-Design and Verification of an Available File System | Lecture Notes in Computer Science | 2018 | 3 |