Cited By
View all- Wu BLiu SXiao YLi ZSun JLin SChandra SBlincoe KTonella P(2023)Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural SlicingProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616351(1371-1383)Online publication date: 30-Nov-2023
- KC DFerra TMorrison C(2023)Neural Machine Translation for Recovering ASTs from Binaries2023 IEEE 3rd International Conference on Software Engineering and Artificial Intelligence (SEAI)10.1109/SEAI59139.2023.10217602(80-85)Online publication date: 16-Jun-2023
- Ouyang YShao KChen KShen RChen CXu MZhang YZhang LGrundy JPollock LPenta M(2023)MirrorTaint: Practical Non-Intrusive Dynamic Taint Tracking for JVM-Based Microservice SystemsProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00210(2514-2526)Online publication date: 14-May-2023
- Show More Cited By