Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EXE: Automatically Generating Inputs of Death., , , , and . ACM Trans. Inf. Syst. Secur., 12 (2): 10:1-10:38 (2008)The Operating System Kernel as a Secure Programmable Machine., , and . ACM SIGOPS European Workshop, page 62-67. ACM, (1994)Fast and flexible application-level networking on exokernel systems., , , , , and . ACM Trans. Comput. Syst., 20 (1): 49-83 (2002)Model Checking Large Network Protocol Implementations., and . NSDI, page 155-168. USENIX, (2004)Using Redundancies to Find Errors., and . IEEE Trans. Software Eng., 29 (10): 915-928 (2003)ASHs: Application-Specific Handlers for High-Performance Messaging., , and . SIGCOMM, page 40-52. ACM, (1996)RWset: Attacking Path Explosion in Constraint-Based Test Generation., , and . TACAS, volume 4963 of Lecture Notes in Computer Science, page 351-366. Springer, (2008)A few billion lines of code later: using static analysis to find bugs in the real world., , , , , , , , , and . Commun. ACM, 53 (2): 66-75 (2010)'C and tcc: A Language and Compiler for Dynamic Code Generation., , , and . ACM Trans. Program. Lang. Syst., 21 (2): 324-369 (1999)Practical, Low-Effort Equivalence Verification of Real Code., and . CAV, volume 6806 of Lecture Notes in Computer Science, page 669-685. Springer, (2011)