David Melski

According to our database1, David Melski authored at least 22 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
API analytics for curating static analysis rules.
Proceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis, 2020

2019
Automated Customized Bug-Benchmark Generation.
CoRR, 2019

Automated Customized Bug-Benchmark Generation.
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019

2018
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge.
IEEE Secur. Priv., 2018

Program splicing.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Data-Driven Program Completion.
CoRR, 2017

Source Forager: A Search Engine for Similar Source Code.
CoRR, 2017

MuSynth: Program Synthesis via Code Reuse and Code Manipulation.
Proceedings of the Search Based Software Engineering - 9th International Symposium, 2017

Vertx: Automated Validation of Binary Transformations.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

2015
Exploiting and Protecting Dynamic Code Generation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

2011
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

2010
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010

2005
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program., 2005

WYSINWYX: What You See Is Not What You eXecute.
Proceedings of the Verified Software: Theories, 2005

Model Checking x86 Executables with CodeSurfer/x86 and WPDS++.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2003
Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

The Interprocedural Express-Lane Transformation.
Proceedings of the Compiler Construction, 12th International Conference, 2003

2000
Interconvertibility of a class of set constraints and context-free-language reachability.
Theor. Comput. Sci., 2000

1999
Interprocedural Path Profiling.
Proceedings of the Compiler Construction, 8th International Conference, 1999

1997
Interconveritibility of Set Constraints and Context-Free Language Reachability.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997


  Loading...