Author of the publication

Proceedings of the Eleventh European Conference on Computer Systems, EuroSys 2016, London, United Kingdom, April 18-21, 2016

, , , and (Eds.) ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)., , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)Multi-solver Support in Symbolic Execution., and . CAV, volume 8044 of Lecture Notes in Computer Science, page 53-68. Springer, (2013)Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?, , and . TAP, volume 11823 of Lecture Notes in Computer Science, page 41-54. Springer, (2019)Chopped symbolic execution., , , and . ICSE, page 350-360. ACM, (2018)High coverage testing of Haskell programs., , and . ISSTA, page 375-385. ACM, (2011)Constraints in Software Testing, Verification and Analysis CSTVA'2013., and . ICST Workshops, page 208-209. IEEE Computer Society, (2013)SnapFuzz: An Efficient Fuzzing Framework for Network Applications., and . CoRR, (2022)Automatically Generating Malicious Disks using Symbolic Execution., , , , and . IEEE Symposium on Security and Privacy, page 243-257. IEEE Computer Society, (2006)Symbolic Crosschecking of Data-Parallel Floating-Point Code., , and . IEEE Trans. Software Eng., 40 (7): 710-737 (2014)Targeted program transformations for symbolic execution.. ESEC/SIGSOFT FSE, page 906-909. ACM, (2015)