Search the dblp DataBase
Zhendong Su :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jedidiah R. Crandall , Gary Wassermann , Daniela A. S. de Oliveira , Zhendong Su , Shyhtsun Felix Wu , Frederic T. Chong Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2006, pp:25-36 [Conf ] Daniela A. S. de Oliveira , Jedidiah R. Crandall , Gary Wassermann , Shyhtsun Felix Wu , Zhendong Su , Frederic T. Chong ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP ] ASID, 2006, pp:66-71 [Conf ] Jedidiah R. Crandall , Zhendong Su , Shyhtsun Felix Wu , Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf ] Zhendong Su , Alexander Aiken Entailment with Conditional Equality Constraints. [Citation Graph (0, 0)][DBLP ] ESOP, 2001, pp:170-189 [Conf ] Joachim Niehren , Tim Priesnitz , Zhendong Su Complexity of Subtype Satisfiability over Posets. [Citation Graph (0, 0)][DBLP ] ESOP, 2005, pp:357-373 [Conf ] Anca Muscholl , Doron Peled , Zhendong Su Deciding Properties for Message Sequence Charts. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 1998, pp:226-242 [Conf ] Gary Wassermann , Zhendong Su Validity Checking for Finite Automata over Linear Arithmetic Constraints. [Citation Graph (0, 0)][DBLP ] FSTTCS, 2006, pp:405-416 [Conf ] Carl Gould , Zhendong Su , Premkumar T. Devanbu Static Checking of Dynamically Generated Queries in Database Applications. [Citation Graph (0, 0)][DBLP ] ICSE, 2004, pp:645-654 [Conf ] Carl Gould , Zhendong Su , Premkumar T. Devanbu JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications. [Citation Graph (0, 0)][DBLP ] ICSE, 2004, pp:697-698 [Conf ] Lingxiao Jiang , Zhendong Su Osprey: a practical type system for validating dimensional unit correctness of C programs. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:262-271 [Conf ] Ghassan Misherghi , Zhendong Su HDD: hierarchical Delta Debugging. [Citation Graph (0, 0)][DBLP ] ICSE, 2006, pp:142-151 [Conf ] Lingxiao Jiang , Ghassan Misherghi , Zhendong Su , Stephane Glondu DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. [Citation Graph (0, 0)][DBLP ] ICSE, 2007, pp:96-105 [Conf ] Manuel Fähndrich , Jeffrey S. Foster , Zhendong Su , Alexander Aiken Partial Online Cycle Elimination in Inclusion Constraint Graphs. [Citation Graph (0, 0)][DBLP ] PLDI, 1998, pp:85-96 [Conf ] Zhendong Su , Gary Wassermann The essence of command injection attacks in web applications. [Citation Graph (0, 0)][DBLP ] POPL, 2006, pp:372-382 [Conf ] Zhendong Su , Alexander Aiken , Joachim Niehren , Tim Priesnitz , Ralf Treinen The first-order theory of subtyping constraints. [Citation Graph (0, 0)][DBLP ] POPL, 2002, pp:203-216 [Conf ] Zhendong Su , Manuel Fähndrich , Alexander Aiken Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:81-95 [Conf ] Lihua Yuan , Jianning Mai , Zhendong Su , Hao Chen , Chen-Nee Chuah , Prasant Mohapatra FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:199-213 [Conf ] Alexander Aiken , Manuel Fähndrich , Zhendong Su Detecting Races in Relay Ladder Logic Programs. [Citation Graph (0, 0)][DBLP ] TACAS, 1998, pp:184-200 [Conf ] Zhendong Su , David Wagner A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. [Citation Graph (0, 0)][DBLP ] TACAS, 2004, pp:280-295 [Conf ] Alexander Aiken , Manuel Fähndrich , Jeffrey S. Foster , Zhendong Su A Toolkit for Constructing Type- and Constraint-Based Program Analyses. [Citation Graph (0, 0)][DBLP ] Types in Compilation, 1998, pp:78-96 [Conf ] Alexander Aiken , Manuel Fähndrich , Zhendong Su Detecting races in Relay Ladder Logic programs. [Citation Graph (0, 0)][DBLP ] STTT, 2000, v:3, n:1, pp:93-105 [Journal ] Zhendong Su , David Wagner A class of polynomially solvable range constraints for interval analysis without widenings. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:345, n:1, pp:122-138 [Journal ] Francis Hsu , Hao Chen , Thomas Ristenpart , Jason Li , Zhendong Su Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:257-268 [Conf ] Gary Wassermann , Zhendong Su Sound and precise analysis of web applications for injection vulnerabilities. [Citation Graph (0, 0)][DBLP ] PLDI, 2007, pp:32-41 [Conf ] Lingxiao Jiang , Zhendong Su , Edwin Chiu Context-based detection of clone-related bugs. [Citation Graph (0, 0)][DBLP ] ESEC/SIGSOFT FSE, 2007, pp:55-64 [Conf ] Gary Wassermann , Carl Gould , Zhendong Su , Premkumar T. Devanbu Static checking of dynamically generated queries in database applications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:4, pp:- [Journal ] Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. [Citation Graph (, )][DBLP ] Client-Side Detection of XSS Worms by Monitoring Payload Propagation. [Citation Graph (, )][DBLP ] Static detection of cross-site scripting vulnerabilities. [Citation Graph (, )][DBLP ] Scalable detection of semantic clones. [Citation Graph (, )][DBLP ] Symbolic mining of temporal specifications. [Citation Graph (, )][DBLP ] Has the bug really been fixed? [Citation Graph (, )][DBLP ] Online inference and enforcement of temporal properties. [Citation Graph (, )][DBLP ] Dynamic test input generation for web applications. [Citation Graph (, )][DBLP ] Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. [Citation Graph (, )][DBLP ] Automatic detection of unsafe component loadings. [Citation Graph (, )][DBLP ] Automatic mining of functionally equivalent code fragments via random testing. [Citation Graph (, )][DBLP ] Detecting code clones in binary executables. [Citation Graph (, )][DBLP ] Context-aware statistical debugging: from bug predictors to faulty control flow paths. [Citation Graph (, )][DBLP ] Static Validation of C Preprocessor Macros. [Citation Graph (, )][DBLP ] Structure and Dynamics of Research Collaboration in Computer Science. [Citation Graph (, )][DBLP ] Javert: fully automatic mining of general temporal properties from dynamic traces. [Citation Graph (, )][DBLP ] Profile-guided program simplification for effective testing and analysis. [Citation Graph (, )][DBLP ] Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs