Cited By
View all- Wen HLiu HSong JChen YGuo WFeng YLuo BLiao XXu JKirda ELie D(2024)FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi ProtocolsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690293(1001-1015)Online publication date: 2-Dec-2024
- Nielebock SBlockhaus PKruger JOrtmeier FHuyen PTan SMechtaev SKhurshid S(2024)ASAP-Repair: API-Specific Automated Program Repair Based on API Usage GraphsProceedings of the 5th ACM/IEEE International Workshop on Automated Program Repair10.1145/3643788.3648011(1-4)Online publication date: 20-Apr-2024
- Blair WAraujo FTaylor TJang J(2024)Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00064(4554-4572)Online publication date: 19-May-2024
- Show More Cited By