Quoc-Sang Phan

Orcid: 0000-0002-1661-044X

According to our database1, Quoc-Sang Phan authored at least 25 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Challenges of Shift Left Static Analysis.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

2022
Analyzing the CMake Build System.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

2020
The Java Pathfinder Workshop 2019.
ACM SIGSOFT Softw. Eng. Notes, 2020

2019
Chapter Six - Symbolic Execution and Recent Applications to Worst-Case Execution, Load Testing, and Security Analysis.
Adv. Comput., 2019

Concolic Testing Heap-Manipulating Programs.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

Enhancing Symbolic Execution of Heap-Based Programs with Separation Logic for Test Input Generation.
Proceedings of the Automated Technology for Verification and Analysis, 2019

2018
Automatic Data Structure Repair usingSeparation Logic.
ACM SIGSOFT Softw. Eng. Notes, 2018

Test input generation using separati logic.
ACM SIGSOFT Softw. Eng. Notes, 2018

Symbolic Side-Channel Analysis for Probabilistic Programs.
IACR Cryptol. ePrint Arch., 2018

Testing heap-based programs with Java StarFinder.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Synthesis of Adaptive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2017

Model-counting Approaches For Nonlinear Numerical Constraints.
IACR Cryptol. ePrint Arch., 2017

2016
String analysis for side channels with segmented oracles.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Model Counting Modulo Theories.
PhD thesis, 2015

Concurrent Bounded Model Checking.
ACM SIGSOFT Softw. Eng. Notes, 2015

Model Counting Modulo Theories.
CoRR, 2015

All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Quantifying information leaks using reliability analysis.
Proceedings of the 2014 International Symposium on Model Checking of Software, 2014

Symbolic Execution as DPLL Modulo Theories.
Proceedings of the 2014 Imperial College Computing Student Workshop, 2014

Abstract model counting: a novel approach for quantification of information leaks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Self-composition by Symbolic Execution.
Proceedings of the 2013 Imperial College Computing Student Workshop, 2013

2012
Symbolic quantitative information flow.
ACM SIGSOFT Softw. Eng. Notes, 2012

2011
Stochastic Local Search for SMT: Combining Theory Solvers with WalkSAT.
Proceedings of the Frontiers of Combining Systems, 8th International Symposium, 2011

2009
Supporting Public Administration with an Integrated BPR Environment.
Proceedings of the E-Infrastructures and E-Services on Developing Countries, 2009


  Loading...