Automata-based model counting for string constraints A Aydin, L Bang, T Bultan Computer Aided Verification: 27th International Conference, CAV 2015, San …, 2015 | 103 | 2015 |
String analysis for side channels with segmented oracles L Bang, A Aydin, QS Phan, CS Păsăreanu, T Bultan Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 75 | 2016 |
Semantic differential repair for input validation and sanitization M Alkhalaf, A Aydin, T Bultan Proceedings of the 2014 International Symposium on Software Testing and …, 2014 | 50 | 2014 |
String Analysis for Software Verification and Security T Bultan, F Yu, M Alkhalaf, A Aydin Springer 10, 978-3, 2017 | 35 | 2017 |
Parameterized model counting for string and numeric constraints A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 31 | 2018 |
Constraint normalization and parameterized caching for quantitative program analysis T Brennan, N Tsiskaridze, N Rosner, A Aydin, T Bultan Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 26 | 2017 |
Automated test generation from vulnerability signatures A Aydin, M Alkhalaf, T Bultan 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 23 | 2014 |
Automatically computing path complexity of programs L Bang, A Aydin, T Bultan Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 19 | 2015 |
Visual configuration of mobile privacy policies A Aydin, D Piorkowski, O Tripp, P Ferrara, M Pistoia Fundamental Approaches to Software Engineering: 20th International …, 2017 | 10 | 2017 |
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis A Aydin University of California, Santa Barbara, 2017 | 5 | 2017 |
String Manipulating Programs and Difficulty of Their Analysis T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 15-22, 2017 | | 2017 |
State Space Exploration T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 23-35, 2017 | | 2017 |
Abstraction and Approximation T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 69-81, 2017 | | 2017 |
Automata Based String Analysis T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 37-55, 2017 | | 2017 |
A Brief Survey of Related Work T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 155-164, 2017 | | 2017 |
Vulnerability Detection and Sanitization Synthesis T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 103-122, 2017 | | 2017 |
Differential String Analysis and Repair T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 123-147, 2017 | | 2017 |
Constraint-Based String Analysis T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 83-102, 2017 | | 2017 |
Relational String Analysis T Bultan, F Yu, M Alkhalaf, A Aydin, T Bultan, F Yu, M Alkhalaf, A Aydin String Analysis for Software Verification and Security, 57-68, 2017 | | 2017 |