According to our database1, David Melski
Legend:Book In proceedings Article PhD thesis Other
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge.
IEEE Security & Privacy, 2018
Data-Driven Program Completion.
Source Forager: A Search Engine for Similar Source Code.
MuSynth: Program Synthesis via Code Reuse and Code Manipulation.
Proceedings of the Search Based Software Engineering - 9th International Symposium, 2017
Exploiting and Protecting Dynamic Code Generation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2010
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program., 2005
WYSINWYX: What You See Is Not What You eXecute.
Proceedings of the Verified Software: Theories, 2005
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
Buffer overrun detection using linear programming and static analysis.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
The Interprocedural Express-Lane Transformation.
Proceedings of the Compiler Construction, 12th International Conference, 2003
Interconvertibility of a class of set constraints and context-free-language reachability.
Theor. Comput. Sci., 2000
Interprocedural Path Profiling.
Proceedings of the Compiler Construction, 8th International Conference, 1999
Interconveritibility of Set Constraints and Context-Free Language Reachability.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97), 1997