Author:
Luckow Kasper,Kersten Rody,Pasareanu Corina
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion;Applied Sciences;2024-02-23
2. Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation;2023 IEEE Symposium on Security and Privacy (SP);2023-05
3. Understanding performance problems in deep learning systems;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
4. Explaining and debugging pathological program behavior;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
5. Learning to Prune Infeasible Paths in Generalized Symbolic Execution;2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE);2022-10