Tevfik Bultan

Orcid: 0000-0003-2993-1215

Affiliations:
  • University of California, Santa Barbara, USA


According to our database1, Tevfik Bultan authored at least 157 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing.
IEEE Softw., 2024

2023
Obtaining Information Leakage Bounds via Approximate Model Counting.
Proc. ACM Program. Lang., 2023

The Case for Scalable Quantitative Neural Network Analysis.
Proceedings of the 1st International Workshop on Dependability and Trustworthiness of Safety-Critical Systems with Machine Learned Components, 2023

Rare Path Guided Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Quantitative Policy Repair for Access Control on the Cloud.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Rare-Seed Generation for Fuzzing.
CoRR, 2022

TSA: a tool to detect and quantify network side-channels.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Quacky: Quantitative Access Control Permissiveness Analyzer✱.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Targeted Black-Box Side-Channel Mitigation for IoT✱.
Proceedings of the 12th International Conference on the Internet of Things, 2022

PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Quantifying Permissiveness of Access Control Policies.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
CorbFuzz: Checking Browser Security Policies with Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
The Java Pathfinder Workshop 2019.
ACM SIGSOFT Softw. Eng. Notes, 2020

JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Feedback-driven side-channel analysis for networked applications.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

JVM fuzzing for JIT-induced side-channel detection.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Incremental Attack Synthesis.
ACM SIGSOFT Softw. Eng. Notes, 2019

Incremental Adaptive Attack Synthesis.
CoRR, 2019

Inductive verification of data model invariants in web applications using first-order logic.
Autom. Softw. Eng., 2019

Quantifying Information Leakage Using Model Counting Constraint Solvers.
Proceedings of the Verified Software. Theories, Tools, and Experiments, 2019

Profit: Detecting and Quantifying Side Channels in Networked Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Subformula Caching for Model Counting and Quantitative Program Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2018
Attack Synthesis for Strings using Meta-Heuristics.
ACM SIGSOFT Softw. Eng. Notes, 2018

Side-Channel Analysis via Symbolic Execution and Model Counting.
ACM SIGSOFT Softw. Eng. Notes, 2018

Parameterized model counting for string and numeric constraints.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Symbolic path cost analysis for side-channel detection.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Static detection of API call vulnerabilities in iOS executables.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Symbolic path cost analysis for side-channel detection.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Information Leakage in Arbiter Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2018

2017
Synthesis of Adaptive Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2017

Guest editorial: emerging areas in automated software engineering research.
Autom. Softw. Eng., 2017

Constraint normalization and parameterized caching for quantitative program analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Symbolic model extraction for web application verification.
Proceedings of the 39th International Conference on Software Engineering, 2017

String Analysis for Software Verification and Security.
Springer, ISBN: 978-3-319-68668-4, 2017

2016
On deciding synchronizability for asynchronously communicating systems.
Theor. Comput. Sci., 2016

String analysis for side channels with segmented oracles.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Finding access control bugs in web applications with CanCheck.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Optimal sanitization synthesis for web application vulnerability repair.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Side Channel Analysis Using a Model Counting Constraint Solver and Symbolic Execution (Invited Talk).
Proceedings of the 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2016

Automated Choreography Repair.
Proceedings of the Fundamental Approaches to Software Engineering, 2016

2015
Data Model Property Inference, Verification, and Repair for Web Applications.
ACM Trans. Softw. Eng. Methodol., 2015

Roundtable: The Future of Software Engineering for Internet Computing.
IEEE Softw., 2015

String Analysis for Vulnerability Detection and Repair.
Proceedings of the Model Checking Software - 22nd International Symposium, 2015

Automatically computing path complexity of programs.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Data Model Bugs.
Proceedings of the NASA Formal Methods - 7th International Symposium, 2015

Efficient Data Model Verification with Many-Sorted Logic (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Coexecutability for Efficient Verification of Data Model Updates.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Automata-Based Model Counting for String Constraints.
Proceedings of the Computer Aided Verification - 27th International Conference, 2015

2014
Automata-based symbolic string analysis for vulnerability detection.
Formal Methods Syst. Des., 2014

Automatic verification of interactions in asynchronous systems with unbounded buffers.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Semantic differential repair for input validation and sanitization.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

Automated Test Generation from Vulnerability Signatures.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Inductive verification of data model invariants for web applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Cloud Platform Support for API Governance.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Data model property inference and repair.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

An integrated data model verifier with property templates.
Proceedings of the 1st FME Workshop on Formal Methods in Software Engineering, 2013

Analyzing Interactions of Asynchronously Communicating Software Components - (Invited Paper).
Proceedings of the Formal Techniques for Distributed Systems, 2013

Compatibility Checking for Asynchronously Communicating Software.
Proceedings of the Formal Aspects of Component Software - 10th International Symposium, 2013

2012
Realizability of Choreographies Using Process Algebra Encodings.
IEEE Trans. Serv. Comput., 2012

Synchronizability for Verification of Asynchronously Communicating Systems.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012

Deciding choreography realizability.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

Unbounded data model verification using SMT solvers.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Verifying client-side input validation functions using string analysis.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Relational String Verification Using Multi-Track Automata.
Int. J. Found. Comput. Sci., 2011

Choreography conformance via synchronizability.
Proceedings of the 20th International Conference on World Wide Web, 2011

String Abstractions for String Verification.
Proceedings of the Model Checking Software, 2011

Bounded verification of Ruby on Rails data models.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

Patching vulnerabilities with sanitization synthesis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Contracting the Facebook API
Proceedings of the Proceedings Fourth International Workshop on Testing, 2010

Runtime Verification of Web Service Interface Contracts.
Computer, 2010

Stranger: An Automata-Based String Analysis Tool for PHP.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Realizability analysis for message-based interactions using shared-state projections.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

Software for everyone by everyone.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Modular verification of synchronization with reentrant locks.
Proceedings of the 8th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2010), 2010

Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines.
Proceedings of the ASE 2010, 2010

2009
Action Language verifier: an infinite-state model checker for reactive software specifications.
Formal Methods Syst. Des., 2009

Symbolic String Verification: Combining String Analysis and Size Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses.
Proceedings of the ASE 2009, 2009

Analyzing singularity channel contracts.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Realizability of Choreographies Using Process Algebra Encodings.
Proceedings of the Integrated Formal Methods, 7th International Conference, 2009

A Tool for Choreography Analysis Using Collaboration Diagrams.
Proceedings of the IEEE International Conference on Web Services, 2009

Generating Interface Grammars from WSDL for Automated Verification of Web Services.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

2008
Interface Grammars for Modular Software Model Checking.
IEEE Trans. Software Eng., 2008

Automated verification of access control policies using a SAT solver.
Int. J. Softw. Tools Technol. Transf., 2008

Specification of realizable service conversations using collaboration diagrams.
Serv. Oriented Comput. Appl., 2008

Choreography Modeling and Analysis with Collaboration Diagrams.
IEEE Data Eng. Bull., 2008

Applying infinite state model checking and other analysis techniques to tabular requirements specifications of safety-critical systems.
Des. Autom. Embed. Syst., 2008

Symbolic String Verification: An Automata-Based Approach.
Proceedings of the Model Checking Software, 2008

Modular verification of web services using efficient symbolic encoding and summarization.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Client and server verification for web services using interface grammars.
Proceedings of the 2008 Workshop on Testing, 2008

Workshop on testing, analysis and verification of web software (TAV-WEB 2008).
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Service Choreography and Orchestration with Conversations.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

2007
Highly dependable concurrent programming using design for verification.
Formal Aspects Comput., 2007

Experimenting with software testbeds for evaluating new technologies.
Empir. Softw. Eng., 2007

Eliminating synchronization faults in air traffic control software via design for verification with concurrency controllers.
Autom. Softw. Eng., 2007

Towards a Theory of Web Service Choreographies.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

Analyzing Conversations: Realizability, Synchronizability, and Verification.
Proceedings of the Test and Analysis of Web Services, 2007

Automated size analysis for OCL.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

Netstub: a framework for verification of distributed java applications.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

2006
Efficient BDDs for bounded arithmetic constraints.
Int. J. Softw. Tools Technol. Transf., 2006

Analyzing Conversations of Web Services.
IEEE Internet Comput., 2006

Analyzing tabular requirements specifications using infinite state model checking.
Proceedings of the 4th ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2006), 2006

2005
Synchronizability of Conversations among Web Services.
IEEE Trans. Software Eng., 2005

Discussion summary: characteristics of web services and their impact on testing, analysis and verification.
ACM SIGSOFT Softw. Eng. Notes, 2005

Realizability of Conversation Protocols with Message Contents.
Int. J. Web Serv. Res., 2005

Design for verification for asynchronously communicating Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Scalable Software Model Checking Using Design for Verification.
Proceedings of the Verified Software: Theories, 2005

Verification of parameterized hierarchical state machines using action language verifier.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005

Panel on design for verification.
Proceedings of the 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 2005

Application of design for verification with concurrency controllers to air traffic control software.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Web Service Interactions: Analysis and Design.
Proceedings of the ICWS 2005 Second International Workshop on Semantic and Dynamic Web Processes, 2005

Verifiable Web Services with Hierarchical Interfaces.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Action Language Verifier, Extended.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Conversation protocols: a formalism for specification and verification of reactive electronic services.
Theor. Comput. Sci., 2004

Past pushdown timed automata and safety verification.
Theor. Comput. Sci., 2004

Analysis of interacting BPEL web services.
Proceedings of the 13th international conference on World Wide Web, 2004

Panel: given that hardware verification has been an uphill battle, what is the future of software verification?
Proceedings of the 2nd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2004), 2004

Verifiable Concurrent Programming Using Concurrency Controllers.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Model checking XML manipulating software.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004

WSAT: A Tool for Formal Analysis of Web Services.
Proceedings of the Computer Aided Verification, 16th International Conference, 2004

Widening Arithmetic Automata.
Proceedings of the Computer Aided Verification, 16th International Conference, 2004

Tools for Automated Verification of Web Services.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

2003
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types.
Int. J. Softw. Tools Technol. Transf., 2003

Efficient Symbolic Representations for Arithmetic Constraints in Verification.
Int. J. Found. Comput. Sci., 2003

Interface-Based Specification and Verification of Concurrency Controllers.
Proceedings of the 2003 Workshop on Software Model Checking, 2003

Conversation specification: a new approach to design and analysis of e-service composition.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Construction of Efficient BDDs for Bounded Arithmetic Constraints.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

Efficient Image Computation in Infinite State Model Checking.
Proceedings of the Computer Aided Verification, 15th International Conference, 2003

2002
Counter Machines and Verification Problems.
Theor. Comput. Sci., 2002

Automata-Based Representations for Arithmetic Constraints in Automated Verification.
Proceedings of the Implementation and Application of Automata, 2002

Formal Verification of e-Services and Workflows.
Proceedings of the Web Services, 2002

Automated Verification of Concurrent Linked Lists with Counters.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Specification, verification, and synthesis of concurrency control components.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

Heuristics for Efficient Manipulation of Composite Constraints.
Proceedings of the Frontiers of Combining Systems, 4th International Workshop, 2002

2001
On Reachability and Safety in Infinite-State Systems.
Int. J. Found. Comput. Sci., 2001

Past Pushdown Timed Automata.
Proceedings of the Implementation and Application of Automata, 2001

A Library for Composite Symbolic Representations.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001

Verification of Vortex Workflows.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001

Action Language Verifier.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

Constraint-Based Verification of Client-Server Protocols.
Proceedings of the Principles and Practice of Constraint Programming, 2001

2000
Composite model-checking: verification with type-specific symbolic representations.
ACM Trans. Softw. Eng. Methodol., 2000

A composite model checking toolset for analyzing software systems.
ACM SIGSOFT Softw. Eng. Notes, 2000

BDD vs. Constraint-Based Model Checking: An Experimental Evaluation for Asynchronous Concurrent Systems.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000

Conter Machines: Decidable Properties and Applications to Verification Problems.
Proceedings of the Mathematical Foundations of Computer Science 2000, 2000

Action Language: a specification language for model checking reactive systems.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Reachability Analysis for Some Models of Infinite-State Transition Systems.
Proceedings of the CONCUR 2000, 2000

Binary Reachability Analysis of Discrete Pushdown Timed Automata.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
Model-checking concurrent systems with unbounded integer variables: symbolic representations, approximations, and experimental results.
ACM Trans. Program. Lang. Syst., 1999

1998
A fast neural-network algorithm for VLSI cell placement.
Neural Networks, 1998

Verifying Systems with Integer Constraints and Boolean Predicates: A Composite Approach.
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998

1997
Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic.
Proceedings of the Computer Aided Verification, 9th International Conference, 1997

1996
Compositional Verification by Model Checking for Counter-Examples.
Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996

1995
Circuit partitioning using mean field annealing.
Neurocomputing, 1995

1992
A New Mapping Heuristic Based on Mean Field Annealing.
J. Parallel Distributed Comput., 1992

1991
Circuit partitioning using parallel mean field annealing algorithms.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991


  Loading...