Author:
Ahmed Iftekhar,Jensen Carlos,Groce Alex,McKenney Paul E.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Cross-Site Request Forgery Vulnerabilities in Web Applications Using Mutation Analysis;2024 2nd International Conference on Software Engineering and Information Technology (ICoSEIT);2024-02-28
2. Please fix this mutant: How do developers resolve mutants surfaced during code review?;2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP);2023-05
3. Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05
4. Faster mutation analysis with MeMu;Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis;2022-07-18
5. Looking for lacunae in Bitcoin core's fuzzing efforts;Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice;2022-05-21