Zhendong Su

According to our database1, Zhendong Su
  • authored at least 111 papers between 1998 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Understanding the syntactic rule usage in java.
Journal of Systems and Software, 2017

A Survey on Data-Flow Testing.
ACM Comput. Surv., 2017

Dynamic Neural Program Embedding for Program Repair.
CoRR, 2017

Interactive, Intelligent Tutoring for Auxiliary Constructions in Geometry Proofs.
CoRR, 2017

Data-Driven Feedback Generation for Introductory Programming Exercises.
CoRR, 2017

Achieving High Coverage for Floating-point Code via Unconstrained Programming (Extended Version).
CoRR, 2017

Guided, stochastic model-based GUI testing of Android apps.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Context-sensitive data-dependence analysis via linear conjunctive language reachability.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

Skeletal program enumeration for rigorous compiler testing.
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017

Achieving high coverage for floating-point code via unconstrained programming.
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017

Stochastic optimization of program obfuscation.
Proceedings of the 39th International Conference on Software Engineering, 2017

Detecting Energy Bugs in Android Apps Using Static Analysis.
Proceedings of the Formal Methods and Software Engineering, 2017

2016
Skeletal Program Enumeration for Rigorous Compiler Testing.
CoRR, 2016

Mathematical Execution: A Unified Approach for Testing Numerical Code.
CoRR, 2016

Toward Rapid Transformation of Ideas into Software.
CoRR, 2016

Automated coverage-driven testing: combining symbolic execution and model checking.
SCIENCE CHINA Information Sciences, 2016

On the naturalness of software.
Commun. ACM, 2016

Coverage-directed differential testing of JVM implementations.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

Finding compiler bugs via live code mutation.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

Building white-box abstractions by program refinement.
Proceedings of the 2016 ACM International Symposium on New Ideas, 2016

Automatic runtime recovery via error handler synthesis.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Toward understanding compiler bugs in GCC and LLVM.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Dimensionally Guided Synthesis of Mathematical Word Problems.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Finding and analyzing compiler warning defects.
Proceedings of the 38th International Conference on Software Engineering, 2016

XSat: A Fast Floating-Point Satisfiability Solver.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

2015
A Study of "Wheat" and "Chaff" in Source Code.
CoRR, 2015

GraphQ: Graph Query Processing with Abstraction Refinement - Scalable and Programmable Analytics over Very Large Graphs on a Single PC.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Guided differential testing of certificate validation in SSL/TLS implementations.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Finding deep compiler bugs via guided stochastic program mutation.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

Automated backward error analysis for numerical code.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

Randomized stress-testing of link-time optimizers.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Automated Geometry Theorem Proving for Human-Readable Proofs.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Automatic Generation of Raven's Progressive Matrices.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

An Empirical Study on Real Bug Fixes.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Combining Symbolic Execution and Model Checking for Data Flow Testing.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
X-Force: Force-Executing Binary Programs for Security Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

On the localness of software.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Compiler validation via equivalence modulo inputs.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Efficient subcubic alias analysis for C.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

Capturing and Exploiting IDE Interactions.
Proceedings of the Onward! 2014, 2014

Detecting Logic Vulnerabilities in E-commerce Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Abstracting Runtime Heaps for Program Understanding.
IEEE Trans. Software Eng., 2013

An empirical analysis of the co-evolution of schema and code in database applications.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Server interface descriptions for automated testing of JavaScript web applications.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Automatic detection of floating-point exceptions.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Fast algorithms for Dyck-CFL-reachability with applications to alias analysis.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Detecting API documentation errors.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013

Steering symbolic execution to less traveled paths.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013

Keyword programming for TouchDevelop.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

SmartSynth: synthesizing smartphone automation scripts from natural language.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

2012
Automatic Detection of Unsafe Dynamic Component Loadings.
IEEE Trans. Software Eng., 2012

Abstracting Runtime Heaps for Program Understanding
CoRR, 2012

Detecting and analyzing insecure component usage.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Testing mined specifications.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Reusing debugging knowledge via trace-based bug search.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

Liberating the programmer with prorogued programming.
Proceedings of the ACM Symposium on New Ideas in Programming and Reflections on Software, 2012

On the naturalness of software.
Proceedings of the 34th International Conference on Software Engineering, 2012

Static Detection of Unsafe Component Loadings.
Proceedings of the Compiler Construction - 21st International Conference, 2012

2011
Static Detection of Access Control Vulnerabilities in Web Applications.
Proceedings of the 20th USENIX Security Symposium, 2011

Synthesizing method sequences for high-coverage testing.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

BQL: capturing and reusing debugging knowledge.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

2010
A study of the uniqueness of source code.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

Scalable and systematic detection of buggy inconsistencies in source code.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

Perturbing numerical calculations for statistical analysis of floating-point program (in)stability.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Automatic detection of unsafe component loadings.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Has the bug really been fixed?
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Online inference and enforcement of temporal properties.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Computational Science, 2009

Structure and Dynamics of Research Collaboration in Computer Science.
Proceedings of the SIAM International Conference on Data Mining, 2009

Static Validation of C Preprocessor Macros.
Proceedings of the ASE 2009, 2009

Detecting code clones in binary executables.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Automatic mining of functionally equivalent code fragments via random testing.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

Client-Side Detection of XSS Worms by Monitoring Payload Propagation.
Proceedings of the Computer Security, 2009

2008
A general framework for benchmarking firewall optimization techniques.
IEEE Trans. Network and Service Management, 2008

Profile-guided program simplification for effective testing and analysis.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Javert: fully automatic mining of general temporal properties from dynamic traces.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Dynamic test input generation for web applications.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Static detection of cross-site scripting vulnerabilities.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Symbolic mining of temporal specifications.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Scalable detection of semantic clones.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

2007
Static checking of dynamically generated queries in database applications.
ACM Trans. Softw. Eng. Methodol., 2007

Context-based detection of clone-related bugs.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

Sound and precise analysis of web applications for injection vulnerabilities.
Proceedings of the ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation, 2007

Context-aware statistical debugging: from bug predictors to faulty control flow paths.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

The essence of command injection attacks in web applications.
Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006

HDD: hierarchical Delta Debugging.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Osprey: a practical type system for validating dimensional unit correctness of C programs.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Validity Checking for Finite Automata over Linear Arithmetic Constraints.
Proceedings of the FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 2006

ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Temporal search: detecting hidden malware timebombs with virtual machines.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
A class of polynomially solvable range constraints for interval analysis without widenings.
Theor. Comput. Sci., 2005

Complexity of Subtype Satisfiability over Posets.
Proceedings of the Programming Languages and Systems, 2005

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

Static Checking of Dynamically Generated Queries in Database Applications.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

2002
The first-order theory of subtyping constraints.
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002

2001
Entailment with Conditional Equality Constraints.
Proceedings of the Programming Languages and Systems, 2001

2000
Detecting races in Relay Ladder Logic programs.
STTT, 2000

Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs.
Proceedings of the POPL 2000, 2000

1998
A Toolkit for Constructing Type- and Constraint-Based Program Analyses.
Proceedings of the Types in Compilation, Second International Workshop, 1998

Detecting Races in Relay Ladder Logic Programs.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1998

Partial Online Cycle Elimination in Inclusion Constraint Graphs.
Proceedings of the ACM SIGPLAN '98 Conference on Programming Language Design and Implementation (PLDI), 1998

Deciding Properties for Message Sequence Charts.
Proceedings of the Foundations of Software Science and Computation Structure, 1998


  Loading...