Cited By
View all- Hu YWang WHunger CWood RKhurshid STiwari MSpinellis DGousios GChechik MDi Penta M(2021)ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilitiesProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468627(316-327)Online publication date: 20-Aug-2021
- Zhang TShen WLee DJung CAzab AWang RHeninger NTraynor P(2019)PeXProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361422(1205-1220)Online publication date: 14-Aug-2019
- Cortesi AHalder RBrabrand CMoreau P(2010)Dependence condition graph for semantics-based abstract program slicingProceedings of the Tenth Workshop on Language Descriptions, Tools and Applications10.1145/1868281.1868285(1-6)Online publication date: 28-Mar-2010
- Show More Cited By