2009 |
36 | EE | Jedidiah R. Crandall,
John Brevik,
Shaozhi Ye,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Transactions on Computational Science 4: 244-262 (2009) |
2008 |
35 | EE | Gary Wassermann,
Zhendong Su:
Static detection of cross-site scripting vulnerabilities.
ICSE 2008: 171-180 |
34 | EE | Mark Gabel,
Lingxiao Jiang,
Zhendong Su:
Scalable detection of semantic clones.
ICSE 2008: 321-330 |
33 | EE | Mark Gabel,
Zhendong Su:
Symbolic mining of temporal specifications.
ICSE 2008: 51-60 |
32 | EE | Gary Wassermann,
Dachuan Yu,
Ajay Chander,
Dinakar Dhurjati,
Hiroshi Inamura,
Zhendong Su:
Dynamic test input generation for web applications.
ISSTA 2008: 249-260 |
31 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shaozhi Ye,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
NOMS 2008: 121-128 |
30 | EE | Mark Gabel,
Zhendong Su:
Javert: fully automatic mining of general temporal properties from dynamic traces.
SIGSOFT FSE 2008: 339-349 |
29 | EE | Lingxiao Jiang,
Zhendong Su:
Profile-guided program simplification for effective testing and analysis.
SIGSOFT FSE 2008: 48-58 |
2007 |
28 | EE | Matthew Van Gundy,
Hao Chen,
Zhendong Su,
Giovanni Vigna:
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
ACSAC 2007: 74-85 |
27 | EE | Lingxiao Jiang,
Zhendong Su:
Context-aware statistical debugging: from bug predictors to faulty control flow paths.
ASE 2007: 184-193 |
26 | EE | Lingxiao Jiang,
Zhendong Su,
Edwin Chiu:
Context-based detection of clone-related bugs.
ESEC/SIGSOFT FSE 2007: 55-64 |
25 | EE | Lingxiao Jiang,
Ghassan Misherghi,
Zhendong Su,
Stephane Glondu:
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones.
ICSE 2007: 96-105 |
24 | EE | Gary Wassermann,
Zhendong Su:
Sound and precise analysis of web applications for injection vulnerabilities.
PLDI 2007: 32-41 |
23 | EE | Gary Wassermann,
Carl Gould,
Zhendong Su,
Premkumar T. Devanbu:
Static checking of dynamically generated queries in database applications.
ACM Trans. Softw. Eng. Methodol. 16(4): (2007) |
2006 |
22 | EE | Francis Hsu,
Hao Chen,
Thomas Ristenpart,
Jason Li,
Zhendong Su:
Back to the Future: A Framework for Automatic Malware Removal and System Repair.
ACSAC 2006: 257-268 |
21 | EE | Daniela A. S. de Oliveira,
Jedidiah R. Crandall,
Gary Wassermann,
Shyhtsun Felix Wu,
Zhendong Su,
Frederic T. Chong:
ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
ASID 2006: 66-71 |
20 | EE | Jedidiah R. Crandall,
Gary Wassermann,
Daniela A. S. de Oliveira,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
Temporal search: detecting hidden malware timebombs with virtual machines.
ASPLOS 2006: 25-36 |
19 | EE | Gary Wassermann,
Zhendong Su:
Validity Checking for Finite Automata over Linear Arithmetic Constraints.
FSTTCS 2006: 405-416 |
18 | EE | Ghassan Misherghi,
Zhendong Su:
HDD: hierarchical Delta Debugging.
ICSE 2006: 142-151 |
17 | EE | Lingxiao Jiang,
Zhendong Su:
Osprey: a practical type system for validating dimensional unit correctness of C programs.
ICSE 2006: 262-271 |
16 | EE | Lihua Yuan,
Jianning Mai,
Zhendong Su,
Hao Chen,
Chen-Nee Chuah,
Prasant Mohapatra:
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
IEEE Symposium on Security and Privacy 2006: 199-213 |
15 | EE | Zhendong Su,
Gary Wassermann:
The essence of command injection attacks in web applications.
POPL 2006: 372-382 |
2005 |
14 | EE | Jedidiah R. Crandall,
Zhendong Su,
Shyhtsun Felix Wu,
Frederic T. Chong:
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
ACM Conference on Computer and Communications Security 2005: 235-248 |
13 | EE | Joachim Niehren,
Tim Priesnitz,
Zhendong Su:
Complexity of Subtype Satisfiability over Posets.
ESOP 2005: 357-373 |
12 | EE | Zhendong Su,
David Wagner:
A class of polynomially solvable range constraints for interval analysis without widenings.
Theor. Comput. Sci. 345(1): 122-138 (2005) |
2004 |
11 | EE | Carl Gould,
Zhendong Su,
Premkumar T. Devanbu:
Static Checking of Dynamically Generated Queries in Database Applications.
ICSE 2004: 645-654 |
10 | EE | Carl Gould,
Zhendong Su,
Premkumar T. Devanbu:
JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications.
ICSE 2004: 697-698 |
9 | EE | Zhendong Su,
David Wagner:
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings.
TACAS 2004: 280-295 |
2002 |
8 | EE | Zhendong Su,
Alexander Aiken,
Joachim Niehren,
Tim Priesnitz,
Ralf Treinen:
The first-order theory of subtyping constraints.
POPL 2002: 203-216 |
2001 |
7 | EE | Zhendong Su,
Alexander Aiken:
Entailment with Conditional Equality Constraints.
ESOP 2001: 170-189 |
2000 |
6 | EE | Zhendong Su,
Manuel Fähndrich,
Alexander Aiken:
Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs.
POPL 2000: 81-95 |
5 | EE | Alexander Aiken,
Manuel Fähndrich,
Zhendong Su:
Detecting races in Relay Ladder Logic programs.
STTT 3(1): 93-105 (2000) |
1998 |
4 | EE | Anca Muscholl,
Doron Peled,
Zhendong Su:
Deciding Properties for Message Sequence Charts.
FoSSaCS 1998: 226-242 |
3 | | Manuel Fähndrich,
Jeffrey S. Foster,
Zhendong Su,
Alexander Aiken:
Partial Online Cycle Elimination in Inclusion Constraint Graphs.
PLDI 1998: 85-96 |
2 | EE | Alexander Aiken,
Manuel Fähndrich,
Zhendong Su:
Detecting Races in Relay Ladder Logic Programs.
TACAS 1998: 184-200 |
1 | EE | Alexander Aiken,
Manuel Fähndrich,
Jeffrey S. Foster,
Zhendong Su:
A Toolkit for Constructing Type- and Constraint-Based Program Analyses.
Types in Compilation 1998: 78-96 |