Nodoze: Combatting threat alert fatigue with automated provenance triage WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates network and distributed systems security symposium, 2019 | 277 | 2019 |
Savior: Towards bug-driven hybrid testing Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu 2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020 | 172 | 2020 |
Eliminating timing side-channel leaks using program repair M Wu, S Guo, P Schaumont, C Wang Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018 | 126 | 2018 |
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu 29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020 | 99 | 2020 |
Assertion guided symbolic execution of multithreaded programs S Guo, M Kusano, C Wang, Z Yang, A Gupta Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 70 | 2015 |
Conc-iSE: Incremental symbolic execution of concurrent software S Guo, M Kusano, C Wang Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016 | 57 | 2016 |
SpecuSym: Speculative symbolic execution for cache timing leak detection S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu, Z Zuo Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 54 | 2020 |
Postconditioned symbolic execution Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao 2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015 | 44 | 2015 |
A survey on automated driving system testing: Landscapes and trends S Tang, Z Zhang, Y Zhang, J Zhou, Y Guo, S Liu, S Guo, YF Li, L Ma, ... ACM Transactions on Software Engineering and Methodology 32 (5), 1-62, 2023 | 42 | 2023 |
Adversarial symbolic execution for detecting concurrency-related cache timing leaks S Guo, M Wu, C Wang Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 42 | 2018 |
Symbolic execution of programmable logic controller code S Guo, M Wu, C Wang Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 40 | 2017 |
Eliminating path redundancy via postconditioned symbolic execution Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao IEEE Transactions on Software Engineering 44 (1), 25-43, 2017 | 38 | 2017 |
Sok: On the semantic ai security in autonomous driving J Shen, N Wang, Z Wan, Y Luo, T Sato, Z Hu, X Zhang, S Guo, Z Zhong, ... arXiv preprint arXiv:2203.05314, 2022 | 33 | 2022 |
Detecting multi-sensor fusion errors in advanced driver-assistance systems Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 20 | 2022 |
Challenging machine learning-based clone detectors via semantic-preserving code transformations W Zhang, S Guo, H Zhang, Y Sui, Y Xue, Y Xu IEEE Transactions on Software Engineering 49 (5), 3052-3070, 2023 | 18 | 2023 |
Coverage-based scene fuzzing for virtual autonomous driving testing Z Hu, S Guo, Z Zhong, K Li arXiv preprint arXiv:2106.00873, 2021 | 17 | 2021 |
Mitigating silent data corruptions in HPC applications across multiple program inputs Y Huang, S Guo, S Di, G Li, F Cappello SC22: International Conference for High Performance Computing, Networking …, 2022 | 8 | 2022 |
Peppa-x: finding program test inputs to bound silent data corruption vulnerability in hpc applications MH Rahman, A Shamji, S Guo, G Li Proceedings of the International Conference for High Performance Computing …, 2021 | 8 | 2021 |
Exposing cache timing side-channel leaks through out-of-order symbolic execution S Guo, Y Chen, J Yu, M Wu, Z Zuo, P Li, Y Cheng, H Wang Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-32, 2020 | 8 | 2020 |
Eunomia: enabling user-specified fine-grained search in symbolically executing WebAssembly binaries N He, Z Zhao, J Wang, Y Hu, S Guo, H Wang, G Liang, D Li, X Chen, ... Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |