Securify: Practical security analysis of smart contracts P Tsankov, A Dan, D Drachsler-Cohen, A Gervais, F Buenzli, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 1009 | 2018 |
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ... IEEE Security and Privacy 2018, 2018 | 999 | 2018 |
VerX: Safety Verification of Smart Contracts A Permenev, D Dimitrov, P Tsankov, D Drachsler-Cohen, M Vechev IEEE Security and Privacy 2020, 2020 | 277 | 2020 |
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts J He, M Balunović, N Ambroladze, P Tsankov, M Vechev ACM CCS, 2019 | 228 | 2019 |
Statistical deobfuscation of android applications B Bichsel, V Raychev, P Tsankov, M Vechev Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 157 | 2016 |
Debin: Predicting debug information in stripped binaries J He, P Ivanov, P Tsankov, V Raychev, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 122 | 2018 |
{NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion A El-Hassany, P Tsankov, L Vanbever, M Vechev 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 110 | 2018 |
SECFUZZ: Fuzz-testing security protocols P Tsankov, MT Dashti, D Basin IEEE/ACM AST 2012, 1-7, 2012 | 105 | 2012 |
zkay: Specifying and Enforcing Data Privacy in Smart Contracts S Steffen, B Bichsel, M Gersbach, N Melchior, P Tsankov, M Vechev ACM CCS, 2019 | 94 | 2019 |
Network-wide configuration synthesis A El-Hassany, P Tsankov, L Vanbever, M Vechev Computer Aided Verification: 29th International Conference, CAV 2017 …, 2017 | 93 | 2017 |
{NetHide}: Secure and practical network topology obfuscation R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev 27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018 | 84 | 2018 |
Dp-finder: Finding differential privacy violations by sampling and optimization B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 67 | 2018 |
Probabilistic verification of network configurations S Steffen, T Gehr, P Tsankov, L Vanbever, M Vechev ACM SIGCOMM, 750-764, 2020 | 49 | 2020 |
Inferring crypto API rules from code changes R Paletov, P Tsankov, V Raychev, M Vechev ACM SIGPLAN Notices 53 (4), 450-464, 2018 | 48 | 2018 |
Decentralized composite access control P Tsankov, S Marinovic, MT Dashti, D Basin Principles of Security and Trust, 245-264, 2014 | 26 | 2014 |
Learning to Explore Paths for Symbolic Execution J He, G Sivanrupan, P Tsankov, M Vechev ACM CCS, 2021 | 25 | 2021 |
Automated discovery of adaptive attacks on adversarial defenses C Yao, P Bielik, P Tsankov, M Vechev Advances in Neural Information Processing Systems 34, 26858-26870, 2021 | 23 | 2021 |
Bayonet: probabilistic inference for networks T Gehr, S Misailovic, P Tsankov, L Vanbever, P Wiesmann, M Vechev ACM SIGPLAN Notices 53 (4), 586-602, 2018 | 23 | 2018 |
Semi-valid input coverage for fuzz testing P Tsankov, MT Dashti, D Basin ACM ISSTA 2013, 2013 | 22 | 2013 |
Synthesis of Probabilistic Privacy Enforcement M Kučera, P Tsankov, T Gehr, M Guarnieri, M Vechev ACM CCS 2017, 2017 | 21 | 2017 |