Travelled to:
1 × Croatia
1 × Cyprus
1 × Denmark
1 × Germany
1 × Greece
1 × Italy
1 × Poland
1 × Russia
1 × United Kingdom
15 × USA
2 × Austria
2 × Canada
2 × China
2 × The Netherlands
3 × France
Collaborated with:
E.M.Clarke T.W.Reps S.A.Seshia H.Veith M.Fredrikson M.Christodorescu W.R.Harris D.Octeau V.Ganapathy S.Chaki D.King T.Jaeger C.Damon D.Jackson S.Schwoon E.A.Emerson P.McDaniel W.R.Marrero ∅ J.M.Wing Y.Lu V.Rastogi R.Joiner W.Li M.d.Kruijf K.Sankaralingam C.Krügel J.Palsberg T.Zhao D.Garlan D.Notkin D.Peled T.Filkorn T.Dreossi M.Dering P.D.McDaniel G.Jin S.Lu M.D.Preda S.K.Debray H.Wang A.P.Sistla D.Luchaup M.Dhawan N.Kidd M.J.Renzelmann A.Balakrishnan M.M.Swift R.E.Bryant A.Groce A.Campailla O.Grumberg D.E.Long A.Browne D.Davidson L.D.Carli J.Zhao A.Albarghouthi S.Jha D.Muthukumaran P.Fenkam H.C.Gall E.Kirda P.A.Porras H.Saïdi V.Yegneswaran A.Bartel L.L.0029 J.Klein Y.L.Traon F.Sagstetter M.Lukasiewycz S.Steinhorst M.Wolf A.Bouard T.Peyrin A.Poschmann S.Chakraborty
Talks about:
analysi (9) secur (6) system (5) check (5) android (4) effici (4) counterexampl (3) symmetri (3) pushdown (3) softwar (3)
Person: Somesh Jha
DBLP: Jha:Somesh
Contributed to:
Wrote 41 papers:
- ICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
- FSE-2014-JoinerRJDG #performance #policy #weaving
- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
- LICS-CSL-2014-FredriksonJ #approach #privacy #satisfiability
- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
- CAV-2013-HarrisJLJ #library #validation
- Validating Library Usage Interactively (WRH, GJ, SL, SJ), pp. 796–812.
- DATE-2013-SagstetterLSWBHJPPC #architecture #challenge #design #hardware #security
- Security challenges in automotive hardware/software architecture design (FS, ML, SS, MW, AB, WRH, SJ, TP, AP, SC), pp. 458–463.
- CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
- CAV-2012-HarrisJR #automaton #game studies #programming #safety
- Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
- DAC-2012-LiSJ #crowdsourcing #named #towards #verification
- CrowdMine: towards crowdsourced human-assisted verification (WL, SAS, SJ), pp. 1254–1255.
- FSE-2012-OcteauJM #android #bytecode #java
- Retargeting Android applications to Java bytecode (DO, SJ, PM), p. 6.
- PLDI-2012-KruijfSJ #compilation #design #static analysis
- Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
- CADE-2011-FredriksonCJ #algorithm #analysis #approximate #behaviour #complexity
- Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
- CAV-2010-Jha #legacy #security
- Retrofitting Legacy Code for Security (SJ), p. 19.
- ESOP-2010-KingJMJJS #automation #security
- Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
- FM-2009-HarrisKCJR #bound #data flow #process #verification
- Verifying Information Flow Control over Unbounded Processes (WRH, NK, SC, SJ, TWR), pp. 773–789.
- ASPLOS-2008-GanapathyRBSJ #design #implementation
- The design and implementation of microdrivers (VG, MJR, AB, MMS, SJ), pp. 168–178.
- FSE-2008-KingJJS #data flow #effectiveness
- Effective blame for information-flow violations (DK, TJ, SJ, SAS), pp. 250–260.
- ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
- Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- POPL-2007-PredaCJD #approach #detection #semantics
- A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
- TACAS-2006-JhaSWR #automaton #trust
- Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
- ICSE-2005-GanapathySJRB #automation
- Automatic discovery of API-level exploits (VG, SAS, SJ, TWR, REB), pp. 312–321.
- ICSE-2003-ChakiCGJV #c #component #composition #verification
- Modular Verification of Software Components in C (SC, EMC, AG, SJ, HV), pp. 385–395.
- SAS-2003-RepsSJ #analysis #automaton #data flow #interprocedural
- Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
- SEKE-2003-ChakiFGJKV #framework #mobile #platform
- Integrating Publish/Subscribe into a Mobile Teamwork Support Platform (SC, PF, HCG, SJ, EK, HV), pp. 510–517.
- FoSSaCS-2002-JhaPZ #performance
- Efficient Type Matching (SJ, JP, TZ), pp. 187–204.
- LICS-2002-ClarkeJLV #model checking
- Tree-Like Counterexamples in Model Checking (EMC, SJ, YL, HV), pp. 19–29.
- ICSE-2001-CampaillaCCJV #performance #using
- Efficient Filtering in Publish-Subscribe Systems Using Binary Decision (AC, SC, EMC, SJ, HV), pp. 443–452.
- ICSE-2001-JhaW #analysis #network
- Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
- CAV-2000-ClarkeGJLV #abstraction #refinement
- Counterexample-Guided Abstraction Refinement (EMC, OG, SJ, YL, HV), pp. 154–169.
- TACAS-2000-ClarkeJM #partial order #protocol #reduction #security #verification
- Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
- CAV-1998-ClarkeEJS #model checking #reduction #symmetry
- Symmetry Reductions inModel Checking (EMC, EAE, SJ, APS), pp. 147–158.
- FSE-1998-GarlanJN #reasoning
- Reasoning about Implicit Invocation (DG, SJ, DN), pp. 209–221.
- TACAS-1997-EmersonJP #partial order #reduction #symmetry
- Combining Partial Order and Symmetry Reductions (EAE, SJ, DP), pp. 19–34.
- FSE-1996-DamonJJ #diagrams #relational #specification
- Checking Relational Specifications With Binary Decision Diagrams (CD, DJ, SJ), pp. 70–80.
- POPL-1996-JacksonJD #performance #specification
- Faster Checking of Software Specifications by Eliminating Isomorphs (DJ, SJ, CD), pp. 79–90.
- CAV-1994-LongBCJM #algorithm #evaluation #fixpoint
- An Improved Algorithm for the Evaluation of Fixpoint Expressions (DEL, AB, EMC, SJ, WRM), pp. 338–350.
- CAV-1993-ClarkeFJ #logic #model checking #symmetry
- Exploiting Symmetry In Temporal Logic Model Checking (EMC, TF, SJ), pp. 450–462.
- ESEC-FSE-2017-RastogiDCJM #automation #named
- Cimplifier: automatically debloating containers (VR, DD, LDC, SJ, PDM), pp. 476–486.
- ESEC-FSE-2018-ZhaoARJO #android #communication #static analysis
- Neural-augmented static analysis of Android communication (JZ, AA, VR, SJ, DO), pp. 342–353.
- CAV-2018-DreossiJS #learning #semantics
- Semantic Adversarial Deep Learning (TD, SJ, SAS), pp. 3–26.
- POPL-2016-OcteauJDMB0KT #android #component #modelling #probability #static analysis
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (DO, SJ, MD, PDM, AB, LL0, JK, YLT), pp. 469–484.