关注
Zhendong Su
Zhendong Su
Professor of Computer Science, ETH Zurich
在 inf.ethz.ch 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Deckard: Scalable and accurate tree-based detection of code clones
L Jiang, G Misherghi, Z Su, S Glondu
29th International Conference on Software Engineering (ICSE'07), 96-105, 2007
14402007
On the naturalness of software
A Hindle, ET Barr, M Gabel, Z Su, P Devanbu
34th International Conference on Software Engineering (ICSE), 837-847, 2012
1370*2012
The essence of command injection attacks in web applications
Z Su, G Wassermann
Acm Sigplan Notices 41 (1), 372-382, 2006
8612006
FIREMAN: A toolkit for firewall modeling and analysis
L Yuan, J Mai, Z Su, H Chen, CN Chuah, P Mohapatra
Security and Privacy, 2006 IEEE Symposium on, 15 pp.-213, 2006
6512006
Static detection of cross-site scripting vulnerabilities
G Wassermann, Z Su
Proceedings of the 30th international conference on Software engineering …, 2008
5592008
Sound and precise analysis of web applications for injection vulnerabilities
G Wassermann, Z Su
Proceedings of the 28th ACM SIGPLAN Conference on Programming Language …, 2007
5582007
Compiler validation via equivalence modulo inputs
V Le, M Afshari, Z Su
ACM Sigplan Notices 49 (6), 216-226, 2014
5242014
Scalable detection of semantic clones
M Gabel, L Jiang, Z Su
Proceedings of the 30th international conference on Software engineering …, 2008
4712008
Guided, stochastic model-based GUI testing of Android apps
T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
3662017
On the localness of software
Z Tu, Z Su, P Devanbu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
3462014
HDD: hierarchical delta debugging
G Misherghi, Z Su
Proceedings of the 28th international conference on Software engineering …, 2006
3132006
Context-based detection of clone-related bugs
L Jiang, Z Su, E Chiu
Proceedings of the the 6th joint meeting of the European software …, 2007
2812007
Partial online cycle elimination in inclusion constraint graphs
M Fähndrich, JS Foster, Z Su, A Aiken
Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998
2791998
Static checking of dynamically generated queries in database applications
C Gould, Z Su, P Devanbu
Proceedings. 26th International Conference on Software Engineering, 645-654, 2004
2722004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2562005
Detecting code clones in binary executables
A Sæbjørnsen, J Willcock, T Panas, D Quinlan, Z Su
Proceedings of the eighteenth international symposium on Software testing …, 2009
2532009
Dynamic test input generation for web applications
G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura, Z Su
Proceedings of the 2008 international symposium on Software testing and …, 2008
2412008
A study of the uniqueness of source code
M Gabel, Z Su
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
2402010
Javert: fully automatic mining of general temporal properties from dynamic traces
M Gabel, Z Su
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008
2402008
Automatic mining of functionally equivalent code fragments via random testing
L Jiang, Z Su
Proceedings of the eighteenth international symposium on Software testing …, 2009
2332009
系统目前无法执行此操作,请稍后再试。
文章 1–20