BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning H Huang, Y Guo, Q Shi, P Yao, R Wu, C Zhang S&P, 2022 | 92 | 2022 |
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction H Huang, P Yao, R Wu, Q Shi, C Zhang 2020 IEEE Symposium on Security and Privacy (SP), 1199-1213, 2020 | 91 | 2020 |
Path-sensitive sparse analysis without path conditions Q Shi, P Yao, R Wu, C Zhang Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 27 | 2021 |
Canary: practical static detection of inter-thread value-flow bugs Y Cai, P Yao, C Zhang Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 21 | 2021 |
Fuzzing SMT solvers via two-dimensional input space exploration P Yao, H Huang, W Tang, Q Shi, R Wu, C Zhang Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 17 | 2021 |
Skeletal approximation enumeration for smt solver testing P Yao, H Huang, W Tang, Q Shi, R Wu, C Zhang Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 15 | 2021 |
Program Analysis via Efficient Symbolic Abstraction P YAO, Q SHI, H HEQING, Z CHARLES | 11 | 2021 |
Fast bit-vector satisfiability P Yao, Q Shi, H Huang, C Zhang Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020 | 11 | 2020 |
Complexity-Guided Container Replacement Synthesis C WANG, P YAO, W TANG, Q SHI, Z CHARLES OOPSLA, 2022 | 8 | 2022 |
Titan: efficient multi-target directed greybox fuzzing H Huang, P Yao, HC Chiu, Y Guo, C Zhang 2024 IEEE Symposium on Security and Privacy (SP), 1849-1864, 2024 | 7 | 2024 |
Indexing the extended dyck-cfl reachability for context-sensitive program analysis Q Shi, Y Wang, P Yao, C Zhang Proceedings of the ACM on Programming Languages 6 (OOPSLA2), 1438-1468, 2022 | 7 | 2022 |
Balance seed scheduling via monte carlo planning H Huang, HC Chiu, Q Shi, P Yao, C Zhang IEEE Transactions on Dependable and Secure Computing 21 (3), 1469-1483, 2023 | 6 | 2023 |
Place your locks well: understanding and detecting lock misuse bugs Y Cai, P Yao, C Ye, C Zhang 32nd USENIX Security Symposium (USENIX Security 23), 3727-3744, 2023 | 6 | 2023 |
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning P Ma, Z Ji, P Yao, S Wang, K Ren Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 4 | 2024 |
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation C Wang, W Wang, P Yao, Q Shi, J Zhou, X Xiao, C Zhang ACM Transactions on Software Engineering and Methodology 32 (3), 1-39, 2023 | 4 | 2023 |
Precise Divide-By-Zero Detection with Affirmative Evidence Y Guo, J Zhou, P Yao, Q Shi, C Zhang ICSE, 2022 | 3 | 2022 |
Duplicate-sensitivity Guided Transformation Synthesis for DBMS Correctness Bug Detection Y Zhang, P Yao, R Wu, C Zhang arXiv preprint arXiv:2107.03660, 2021 | 2 | 2021 |
KBX: Verified Model Synchronization via Formal Bidirectional Transformation J Zhao, Y Zhao, P Yao, F Zeng, B Zhan, K Ren ACM Transactions on Software Engineering and Methodology, 2024 | 1 | 2024 |
Siro: Empowering Version Compatibility in Intermediate Representations via Program Synthesis B Zhang, W Chen, P Yao, C Wang, W Tang, C Zhang Proceedings of the 29th ACM International Conference on Architectural …, 2024 | 1 | 2024 |
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions W Tang, D Dong, S Li, C Wang, P Yao, J Zhou, C Zhang ACM Transactions on Software Engineering and Methodology 33 (3), 1-33, 2024 | 1 | 2024 |