The SCEAS System
Navigation Menu

Search the dblp DataBase


Zhendong Su: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jedidiah R. Crandall, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    Temporal search: detecting hidden malware timebombs with virtual machines. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:25-36 [Conf]
  2. Daniela A. S. de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su, Frederic T. Chong
    ExecRecorder: VM-based full-system replay for attack analysis and system recovery. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:66-71 [Conf]
  3. Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong
    On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:235-248 [Conf]
  4. Zhendong Su, Alexander Aiken
    Entailment with Conditional Equality Constraints. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:170-189 [Conf]
  5. Joachim Niehren, Tim Priesnitz, Zhendong Su
    Complexity of Subtype Satisfiability over Posets. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:357-373 [Conf]
  6. Anca Muscholl, Doron Peled, Zhendong Su
    Deciding Properties for Message Sequence Charts. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 1998, pp:226-242 [Conf]
  7. Gary Wassermann, Zhendong Su
    Validity Checking for Finite Automata over Linear Arithmetic Constraints. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2006, pp:405-416 [Conf]
  8. Carl Gould, Zhendong Su, Premkumar T. Devanbu
    Static Checking of Dynamically Generated Queries in Database Applications. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:645-654 [Conf]
  9. Carl Gould, Zhendong Su, Premkumar T. Devanbu
    JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications. [Citation Graph (0, 0)][DBLP]
    ICSE, 2004, pp:697-698 [Conf]
  10. Lingxiao Jiang, Zhendong Su
    Osprey: a practical type system for validating dimensional unit correctness of C programs. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:262-271 [Conf]
  11. Ghassan Misherghi, Zhendong Su
    HDD: hierarchical Delta Debugging. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:142-151 [Conf]
  12. Lingxiao Jiang, Ghassan Misherghi, Zhendong Su, Stephane Glondu
    DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:96-105 [Conf]
  13. Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su, Alexander Aiken
    Partial Online Cycle Elimination in Inclusion Constraint Graphs. [Citation Graph (0, 0)][DBLP]
    PLDI, 1998, pp:85-96 [Conf]
  14. Zhendong Su, Gary Wassermann
    The essence of command injection attacks in web applications. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:372-382 [Conf]
  15. Zhendong Su, Alexander Aiken, Joachim Niehren, Tim Priesnitz, Ralf Treinen
    The first-order theory of subtyping constraints. [Citation Graph (0, 0)][DBLP]
    POPL, 2002, pp:203-216 [Conf]
  16. Zhendong Su, Manuel Fähndrich, Alexander Aiken
    Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:81-95 [Conf]
  17. Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
    FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:199-213 [Conf]
  18. Alexander Aiken, Manuel Fähndrich, Zhendong Su
    Detecting Races in Relay Ladder Logic Programs. [Citation Graph (0, 0)][DBLP]
    TACAS, 1998, pp:184-200 [Conf]
  19. Zhendong Su, David Wagner
    A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings. [Citation Graph (0, 0)][DBLP]
    TACAS, 2004, pp:280-295 [Conf]
  20. Alexander Aiken, Manuel Fähndrich, Jeffrey S. Foster, Zhendong Su
    A Toolkit for Constructing Type- and Constraint-Based Program Analyses. [Citation Graph (0, 0)][DBLP]
    Types in Compilation, 1998, pp:78-96 [Conf]
  21. Alexander Aiken, Manuel Fähndrich, Zhendong Su
    Detecting races in Relay Ladder Logic programs. [Citation Graph (0, 0)][DBLP]
    STTT, 2000, v:3, n:1, pp:93-105 [Journal]
  22. Zhendong Su, David Wagner
    A class of polynomially solvable range constraints for interval analysis without widenings. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:345, n:1, pp:122-138 [Journal]
  23. Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
    Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:257-268 [Conf]
  24. Gary Wassermann, Zhendong Su
    Sound and precise analysis of web applications for injection vulnerabilities. [Citation Graph (0, 0)][DBLP]
    PLDI, 2007, pp:32-41 [Conf]
  25. Lingxiao Jiang, Zhendong Su, Edwin Chiu
    Context-based detection of clone-related bugs. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:55-64 [Conf]
  26. Gary Wassermann, Carl Gould, Zhendong Su, Premkumar T. Devanbu
    Static checking of dynamically generated queries in database applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2007, v:16, n:4, pp:- [Journal]

  27. Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. [Citation Graph (, )][DBLP]

  28. Client-Side Detection of XSS Worms by Monitoring Payload Propagation. [Citation Graph (, )][DBLP]

  29. Static detection of cross-site scripting vulnerabilities. [Citation Graph (, )][DBLP]

  30. Scalable detection of semantic clones. [Citation Graph (, )][DBLP]

  31. Symbolic mining of temporal specifications. [Citation Graph (, )][DBLP]

  32. Has the bug really been fixed? [Citation Graph (, )][DBLP]

  33. Online inference and enforcement of temporal properties. [Citation Graph (, )][DBLP]

  34. Dynamic test input generation for web applications. [Citation Graph (, )][DBLP]

  35. Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. [Citation Graph (, )][DBLP]

  36. Automatic detection of unsafe component loadings. [Citation Graph (, )][DBLP]

  37. Automatic mining of functionally equivalent code fragments via random testing. [Citation Graph (, )][DBLP]

  38. Detecting code clones in binary executables. [Citation Graph (, )][DBLP]

  39. Context-aware statistical debugging: from bug predictors to faulty control flow paths. [Citation Graph (, )][DBLP]

  40. Static Validation of C Preprocessor Macros. [Citation Graph (, )][DBLP]

  41. Structure and Dynamics of Research Collaboration in Computer Science. [Citation Graph (, )][DBLP]

  42. Javert: fully automatic mining of general temporal properties from dynamic traces. [Citation Graph (, )][DBLP]

  43. Profile-guided program simplification for effective testing and analysis. [Citation Graph (, )][DBLP]

  44. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002