Binary Code Reverse Engineering and Retrofitting
Principled Side Channel Vulnerability Detection and Mitigation
Program Synthesis Using Deep Learning
Towards Secure Lean Software
Programming in Eliza
Cruiser: Concurrent Buffer Overflow Monitoring Using Lock-free Data Structures
SPLAD: Obfuscation Resilient Software Plagiarism Detection
BIM Data Hub: Software Interoperability for Building Information Modeling
Foundational Proof-Carrying Code
for security of untrusted code.
: Debugging concurrent programs with sequential analysis.
: Program analysis on large-scale production code for concurrency defect detection.
for software specification and verification.