Follow
Abdulbaki Aydin
Title
Cited by
Cited by
Year
Automata-based model counting for string constraints
A Aydin, L Bang, T Bultan
International Conference on Computer Aided Verification, 255-272, 2015
1112015
String analysis for side channels with segmented oracles
L Bang, A Aydin, QS Phan, CS Păsăreanu, T Bultan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
842016
Semantic differential repair for input validation and sanitization
M Alkhalaf, A Aydin, T Bultan
Proceedings of the 2014 International Symposium on Software Testing and …, 2014
522014
String analysis for software verification and security
T Bultan, F Yu, M Alkhalaf, A Aydin
Springer 10, 978-3, 2017
392017
Parameterized model counting for string and numeric constraints
A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
332018
Constraint normalization and parameterized caching for quantitative program analysis
T Brennan, N Tsiskaridze, N Rosner, A Aydin, T Bultan
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
272017
Automatically computing path complexity of programs
L Bang, A Aydin, T Bultan
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
242015
Automated test generation from vulnerability signatures
A Aydin, M Alkhalaf, T Bultan
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
232014
Visual configuration of mobile privacy policies
A Aydin, D Piorkowski, O Tripp, P Ferrara, M Pistoia
Fundamental Approaches to Software Engineering: 20th International …, 2017
122017
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis
A Aydin
University of California, Santa Barbara, 2017
52017
String Manipulating Programs and Difficulty of Their Analysis
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 15-22, 2017
12017
Relational string analysis
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 57-68, 2017
12017
State Space Exploration
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 23-35, 2017
2017
Abstraction and Approximation
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 69-81, 2017
2017
Automata Based String Analysis
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 37-55, 2017
2017
A Brief Survey of Related Work
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 155-164, 2017
2017
Vulnerability Detection and Sanitization Synthesis
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 103-122, 2017
2017
Differential String Analysis and Repair
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 123-147, 2017
2017
Constraint-Based String Analysis
T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin
String Analysis for Software Verification and Security, 83-102, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–19