Duc-Hiep Chu

According to our database1, Duc-Hiep Chu authored at least 18 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Inter-theory dependency analysis for SMT string solvers.
Proc. ACM Program. Lang., 2020

S3: syntax- and semantic-guided repair synthesis via programming by examples.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

JFIX: semantics-based repair of Java programs via symbolic PathFinder.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Model Counting for Recursively-Defined Strings.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

Making Smart Contracts Smarter.
IACR Cryptol. ePrint Arch., 2016

Incremental Quantitative Analysis on Dynamic Costs.
CoRR, 2016

Precise Cache Timing Analysis via Symbolic Execution.
Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016

Symbolic execution for memory consumption analysis.
Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, 2016

Progressive Reasoning over Recursively-Defined Strings.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

Local Reasoning with First-Class Heaps, and a New Frame Rule.
CoRR, 2015

Automatic induction proofs of data-structures in imperative programs.
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2015

Automating Proofs of Data-Structure Properties in Imperative Programs.
CoRR, 2014

Lazy Symbolic Execution for Enhanced Learning.
Proceedings of the Runtime Verification - 5th International Conference, 2014

A Framework to Synergize Partial Order Reduction with State Interpolation.
Proceedings of the Hardware and Software: Verification and Testing, 2014

S3: A Symbolic String Solver for Vulnerability Detection in Web Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Path-sensitive resource analysis compliant with assertions.
Proceedings of the International Conference on Embedded Software, 2013

A Complete Method for Symmetry Reduction in Safety Verification.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Symbolic simulation on complicated loops for WCET path analysis.
Proceedings of the 11th International Conference on Embedded Software, 2011