Petar Tsankov

According to our database1, Petar Tsankov authored at least 33 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

2021
Metha: Network Verifiers Need To Be Correct Too!
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

Automated Discovery of Adaptive Attacks on Adversarial Defenses.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Robustness Testing of AI Systems: A Case Study for Traffic Sign Recognition.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

Learning to Explore Paths for Symbolic Execution.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
zkay v0.2: Practical Data Privacy for Smart Contracts.
CoRR, 2020

VerX: Safety Verification of Smart Contracts.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Probabilistic Verification of Network Configurations.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

2019
zkay: Specifying and Enforcing Data Privacy in Smart Contracts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Learning to Fuzz from Symbolic Execution with Application to Smart Contracts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
NetHide: Secure and Practical Network Topology Obfuscation.
Proceedings of the 27th USENIX Security Symposium, 2018

AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Inferring crypto API rules from code changes.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Bayonet: probabilistic inference for networks.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Security Analysis of Smart Contracts in Datalog.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

Securify: Practical Security Analysis of Smart Contracts.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Debin: Predicting Debug Information in Stripped Binaries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Force Open: Lightweight black box file repair.
Digit. Investig., 2017

Test execution checkpointing for web applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Synthesis of Probabilistic Privacy Enforcement.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Network-Wide Configuration Synthesis.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

2016
Access Control with Formal Security Guarantees.
PhD thesis, 2016

Access Control Synthesis for Physical Spaces.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Statistical Deobfuscation of Android Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

FASE: functionality-aware security enforcement.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
Decentralized Composite Access Control.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Fail-Secure Access Control.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Semi-valid input coverage for fuzz testing.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

2012
SECFUZZ: Fuzz-testing security protocols.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

2011
Constructing Mid-Points for Two-Party Asynchronous Protocols.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

Execution Hijacking: Improving Dynamic Analysis by Flying off Course.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011


  Loading...