BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Croatia
1 × Cyprus
1 × Denmark
1 × Germany
1 × Greece
1 × Italy
1 × Poland
1 × Russia
1 × United Kingdom
15 × USA
2 × Austria
2 × Canada
2 × China
2 × The Netherlands
3 × France
Collaborated with:
E.M.Clarke T.W.Reps S.A.Seshia H.Veith M.Fredrikson M.Christodorescu W.R.Harris D.Octeau V.Ganapathy S.Chaki D.King T.Jaeger C.Damon D.Jackson S.Schwoon E.A.Emerson P.McDaniel W.R.Marrero J.M.Wing Y.Lu V.Rastogi R.Joiner W.Li M.d.Kruijf K.Sankaralingam C.Krügel J.Palsberg T.Zhao D.Garlan D.Notkin D.Peled T.Filkorn T.Dreossi M.Dering P.D.McDaniel G.Jin S.Lu M.D.Preda S.K.Debray H.Wang A.P.Sistla D.Luchaup M.Dhawan N.Kidd M.J.Renzelmann A.Balakrishnan M.M.Swift R.E.Bryant A.Groce A.Campailla O.Grumberg D.E.Long A.Browne D.Davidson L.D.Carli J.Zhao A.Albarghouthi S.Jha D.Muthukumaran P.Fenkam H.C.Gall E.Kirda P.A.Porras H.Saïdi V.Yegneswaran A.Bartel L.L.0029 J.Klein Y.L.Traon F.Sagstetter M.Lukasiewycz S.Steinhorst M.Wolf A.Bouard T.Peyrin A.Poschmann S.Chakraborty
Talks about:
analysi (9) secur (6) system (5) check (5) android (4) effici (4) counterexampl (3) symmetri (3) pushdown (3) softwar (3)

Person: Somesh Jha

DBLP DBLP: Jha:Somesh

Contributed to:

ICSE 20152015
FSE 20142014
CSL-LICS 20142014
CAV 20132013
DATE 20132013
CAV 20122012
DAC 20122012
FSE 20122012
PLDI 20122012
CADE 20112011
CAV 20102010
ESOP 20102010
FM 20092009
ASPLOS 20082008
FSE 20082008
ESEC/FSE 20072007
ICSE 20072007
POPL 20072007
TACAS 20062006
ICSE 20052005
ICSE 20032003
SAS 20032003
SEKE 20032003
FoSSaCS 20022002
LICS 20022002
ICSE 20012001
CAV 20002000
TACAS 20002000
CAV 19981998
FSE 19981998
TACAS 19971997
FSE 19961996
POPL 19961996
CAV 19941994
CAV 19931993
ESEC/FSE 20172017
ESEC/FSE 20182018
CAV (1) 20182018
POPL 20162016

Wrote 41 papers:

ICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
FSE-2014-JoinerRJDG #performance #policy #weaving
Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
LICS-CSL-2014-FredriksonJ #approach #privacy #satisfiability
Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
CAV-2013-HarrisJLJ #library #validation
Validating Library Usage Interactively (WRH, GJ, SL, SJ), pp. 796–812.
DATE-2013-SagstetterLSWBHJPPC #architecture #challenge #design #hardware #security
Security challenges in automotive hardware/software architecture design (FS, ML, SS, MW, AB, WRH, SJ, TP, AP, SC), pp. 458–463.
CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
CAV-2012-HarrisJR #automaton #game studies #programming #safety
Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
DAC-2012-LiSJ #crowdsourcing #named #towards #verification
CrowdMine: towards crowdsourced human-assisted verification (WL, SAS, SJ), pp. 1254–1255.
FSE-2012-OcteauJM #android #bytecode #java
Retargeting Android applications to Java bytecode (DO, SJ, PM), p. 6.
PLDI-2012-KruijfSJ #compilation #design #static analysis
Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
CADE-2011-FredriksonCJ #algorithm #analysis #approximate #behaviour #complexity
Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
CAV-2010-Jha #legacy #security
Retrofitting Legacy Code for Security (SJ), p. 19.
ESOP-2010-KingJMJJS #automation #security
Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
FM-2009-HarrisKCJR #bound #data flow #process #verification
Verifying Information Flow Control over Unbounded Processes (WRH, NK, SC, SJ, TWR), pp. 773–789.
ASPLOS-2008-GanapathyRBSJ #design #implementation
The design and implementation of microdrivers (VG, MJR, AB, MMS, SJ), pp. 168–178.
FSE-2008-KingJJS #data flow #effectiveness
Effective blame for information-flow violations (DK, TJ, SJ, SAS), pp. 250–260.
ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
POPL-2007-PredaCJD #approach #detection #semantics
A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
TACAS-2006-JhaSWR #automaton #trust
Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
ICSE-2005-GanapathySJRB #automation
Automatic discovery of API-level exploits (VG, SAS, SJ, TWR, REB), pp. 312–321.
ICSE-2003-ChakiCGJV #c #component #composition #verification
Modular Verification of Software Components in C (SC, EMC, AG, SJ, HV), pp. 385–395.
SAS-2003-RepsSJ #analysis #automaton #data flow #interprocedural
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
SEKE-2003-ChakiFGJKV #framework #mobile #platform
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform (SC, PF, HCG, SJ, EK, HV), pp. 510–517.
FoSSaCS-2002-JhaPZ #performance
Efficient Type Matching (SJ, JP, TZ), pp. 187–204.
LICS-2002-ClarkeJLV #model checking
Tree-Like Counterexamples in Model Checking (EMC, SJ, YL, HV), pp. 19–29.
ICSE-2001-CampaillaCCJV #performance #using
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision (AC, SC, EMC, SJ, HV), pp. 443–452.
ICSE-2001-JhaW #analysis #network
Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
CAV-2000-ClarkeGJLV #abstraction #refinement
Counterexample-Guided Abstraction Refinement (EMC, OG, SJ, YL, HV), pp. 154–169.
TACAS-2000-ClarkeJM #partial order #protocol #reduction #security #verification
Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
CAV-1998-ClarkeEJS #model checking #reduction #symmetry
Symmetry Reductions inModel Checking (EMC, EAE, SJ, APS), pp. 147–158.
FSE-1998-GarlanJN #reasoning
Reasoning about Implicit Invocation (DG, SJ, DN), pp. 209–221.
TACAS-1997-EmersonJP #partial order #reduction #symmetry
Combining Partial Order and Symmetry Reductions (EAE, SJ, DP), pp. 19–34.
FSE-1996-DamonJJ #diagrams #relational #specification
Checking Relational Specifications With Binary Decision Diagrams (CD, DJ, SJ), pp. 70–80.
POPL-1996-JacksonJD #performance #specification
Faster Checking of Software Specifications by Eliminating Isomorphs (DJ, SJ, CD), pp. 79–90.
CAV-1994-LongBCJM #algorithm #evaluation #fixpoint
An Improved Algorithm for the Evaluation of Fixpoint Expressions (DEL, AB, EMC, SJ, WRM), pp. 338–350.
CAV-1993-ClarkeFJ #logic #model checking #symmetry
Exploiting Symmetry In Temporal Logic Model Checking (EMC, TF, SJ), pp. 450–462.
ESEC-FSE-2017-RastogiDCJM #automation #named
Cimplifier: automatically debloating containers (VR, DD, LDC, SJ, PDM), pp. 476–486.
ESEC-FSE-2018-ZhaoARJO #android #communication #static analysis
Neural-augmented static analysis of Android communication (JZ, AA, VR, SJ, DO), pp. 342–353.
CAV-2018-DreossiJS #learning #semantics
Semantic Adversarial Deep Learning (TD, SJ, SAS), pp. 3–26.
POPL-2016-OcteauJDMB0KT #android #component #modelling #probability #static analysis
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (DO, SJ, MD, PDM, AB, LL0, JK, YLT), pp. 469–484.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.