Rubio-Medrano C, Kotak A, Wang W and Sohr K. Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. Proceedings of the 29th ACM Symposium on Access Control Models and Technologies. (105-116).
Liu S, Ma W, Wang J, Xie X, Feng R and Liu Y. Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation. Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. (166-177).
Wang P, Liu S, Liu A and Jiang W.
(2024). Detecting security vulnerabilities with vulnerability nets. Journal of Systems and Software. 208:C. Online publication date: 1-Feb-2024.
Meng D, Guerriero M, Machiry A, Aghakhani H, Bose P, Continella A, Kruegel C and Vigna G. Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. (731-743).
He S, Lahiri S and Rakamarić Z.
(2018). Verifying Relative Safety, Accuracy, and Termination for Program Approximations. Journal of Automated Reasoning. 60:1. (23-42). Online publication date: 1-Jan-2018.
He S, Lahiri S and Rakamarić Z. Verifying Relative Safety, Accuracy, and Termination for Program Approximations. Proceedings of the 8th International Symposium on NASA Formal Methods - Volume 9690. (237-254).
Hermann B, Reif M, Eichberg M and Mezini M. Getting to know you: towards a capability model for Java. Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. (758-769).