2009 | ||
---|---|---|
36 | EE | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Transactions on Computational Science 4: 244-262 (2009) |
2008 | ||
35 | EE | Gary Wassermann, Zhendong Su: Static detection of cross-site scripting vulnerabilities. ICSE 2008: 171-180 |
34 | EE | Mark Gabel, Lingxiao Jiang, Zhendong Su: Scalable detection of semantic clones. ICSE 2008: 321-330 |
33 | EE | Mark Gabel, Zhendong Su: Symbolic mining of temporal specifications. ICSE 2008: 51-60 |
32 | EE | Gary Wassermann, Dachuan Yu, Ajay Chander, Dinakar Dhurjati, Hiroshi Inamura, Zhendong Su: Dynamic test input generation for web applications. ISSTA 2008: 249-260 |
31 | EE | Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. NOMS 2008: 121-128 |
30 | EE | Mark Gabel, Zhendong Su: Javert: fully automatic mining of general temporal properties from dynamic traces. SIGSOFT FSE 2008: 339-349 |
29 | EE | Lingxiao Jiang, Zhendong Su: Profile-guided program simplification for effective testing and analysis. SIGSOFT FSE 2008: 48-58 |
2007 | ||
28 | EE | Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna: Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85 |
27 | EE | Lingxiao Jiang, Zhendong Su: Context-aware statistical debugging: from bug predictors to faulty control flow paths. ASE 2007: 184-193 |
26 | EE | Lingxiao Jiang, Zhendong Su, Edwin Chiu: Context-based detection of clone-related bugs. ESEC/SIGSOFT FSE 2007: 55-64 |
25 | EE | Lingxiao Jiang, Ghassan Misherghi, Zhendong Su, Stephane Glondu: DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. ICSE 2007: 96-105 |
24 | EE | Gary Wassermann, Zhendong Su: Sound and precise analysis of web applications for injection vulnerabilities. PLDI 2007: 32-41 |
23 | EE | Gary Wassermann, Carl Gould, Zhendong Su, Premkumar T. Devanbu: Static checking of dynamically generated queries in database applications. ACM Trans. Softw. Eng. Methodol. 16(4): (2007) |
2006 | ||
22 | EE | Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su: Back to the Future: A Framework for Automatic Malware Removal and System Repair. ACSAC 2006: 257-268 |
21 | EE | Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong: ExecRecorder: VM-based full-system replay for attack analysis and system recovery. ASID 2006: 66-71 |
20 | EE | Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: Temporal search: detecting hidden malware timebombs with virtual machines. ASPLOS 2006: 25-36 |
19 | EE | Gary Wassermann, Zhendong Su: Validity Checking for Finite Automata over Linear Arithmetic Constraints. FSTTCS 2006: 405-416 |
18 | EE | Ghassan Misherghi, Zhendong Su: HDD: hierarchical Delta Debugging. ICSE 2006: 142-151 |
17 | EE | Lingxiao Jiang, Zhendong Su: Osprey: a practical type system for validating dimensional unit correctness of C programs. ICSE 2006: 262-271 |
16 | EE | Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra: FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. IEEE Symposium on Security and Privacy 2006: 199-213 |
15 | EE | Zhendong Su, Gary Wassermann: The essence of command injection attacks in web applications. POPL 2006: 372-382 |
2005 | ||
14 | EE | Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong: On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. ACM Conference on Computer and Communications Security 2005: 235-248 |
13 | EE | Joachim Niehren, Tim Priesnitz, Zhendong Su: Complexity of Subtype Satisfiability over Posets. ESOP 2005: 357-373 |
12 | EE | Zhendong Su, David Wagner: A class of polynomially solvable range constraints for interval analysis without widenings. Theor. Comput. Sci. 345(1): 122-138 (2005) |
2004 | ||
11 | EE | Carl Gould, Zhendong Su, Premkumar T. Devanbu: Static Checking of Dynamically Generated Queries in Database Applications. ICSE 2004: 645-654 |
10 | EE | Carl Gould, Zhendong Su, Premkumar T. Devanbu: JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications. ICSE 2004: 697-698 |
9 | EE | Zhendong Su, David Wagner: A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. TACAS 2004: 280-295 |
2002 | ||
8 | EE | Zhendong Su, Alexander Aiken, Joachim Niehren, Tim Priesnitz, Ralf Treinen: The first-order theory of subtyping constraints. POPL 2002: 203-216 |
2001 | ||
7 | EE | Zhendong Su, Alexander Aiken: Entailment with Conditional Equality Constraints. ESOP 2001: 170-189 |
2000 | ||
6 | EE | Zhendong Su, Manuel Fähndrich, Alexander Aiken: Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs. POPL 2000: 81-95 |
5 | EE | Alexander Aiken, Manuel Fähndrich, Zhendong Su: Detecting races in Relay Ladder Logic programs. STTT 3(1): 93-105 (2000) |
1998 | ||
4 | EE | Anca Muscholl, Doron Peled, Zhendong Su: Deciding Properties for Message Sequence Charts. FoSSaCS 1998: 226-242 |
3 | Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su, Alexander Aiken: Partial Online Cycle Elimination in Inclusion Constraint Graphs. PLDI 1998: 85-96 | |
2 | EE | Alexander Aiken, Manuel Fähndrich, Zhendong Su: Detecting Races in Relay Ladder Logic Programs. TACAS 1998: 184-200 |
1 | EE | Alexander Aiken, Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su: A Toolkit for Constructing Type- and Constraint-Based Program Analyses. Types in Compilation 1998: 78-96 |