Cited By
View all- Yin ZSong YZong G(2024)Discovering API usage specifications for security detection using two-stage code miningCybersecurity10.1186/s42400-024-00224-w7:1Online publication date: 3-Oct-2024
- Liu HJia ZLi SLei YYu YJiang YMao XLiao X(2024)Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling BugsProceedings of the ACM on Software Engineering10.1145/36607871:FSE(1796-1818)Online publication date: 12-Jul-2024
- Chapman PRubio-González CThakur AMonat RRubio-González C(2024)Interleaving Static Analysis and LLM PromptingProceedings of the 13th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis10.1145/3652588.3663317(9-17)Online publication date: 20-Jun-2024
- Show More Cited By