Author of the publication

Symbolic execution for software testing: three decades later.

, and . Commun. ACM, 56 (2): 82-90 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraints in Software Testing, Verification and Analysis CSTVA'2013., and . ICST Workshops, page 208-209. IEEE Computer Society, (2013)High coverage testing of Haskell programs., , and . ISSTA, page 375-385. ACM, (2011)A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)., , , , and . ACSAC, page 82-90. IEEE Computer Society, (2004)Constraints in Dynamic Symbolic Execution: Bitvectors or Integers?, , and . TAP, volume 11823 of Lecture Notes in Computer Science, page 41-54. Springer, (2019)Chopped symbolic execution., , , and . ICSE, page 350-360. ACM, (2018)Multi-solver Support in Symbolic Execution., and . CAV, volume 8044 of Lecture Notes in Computer Science, page 53-68. Springer, (2013)SnapFuzz: An Efficient Fuzzing Framework for Network Applications., and . CoRR, (2022)Automatically Generating Malicious Disks using Symbolic Execution., , , , and . IEEE Symposium on Security and Privacy, page 243-257. IEEE Computer Society, (2006)Targeted program transformations for symbolic execution.. ESEC/SIGSOFT FSE, page 906-909. ACM, (2015)Accelerating array constraints in symbolic execution., , , and . ISSTA, page 68-78. ACM, (2017)