Smart greybox fuzzing VT Pham, M Böhme, AE Santosa, AR Căciulescu, A Roychoudhury IEEE Transactions on Software Engineering 47 (9), 1980-1997, 2019 | 220 | 2019 |
TRACER: A symbolic execution tool for verification J Jaffar, V Murali, JA Navas, AE Santosa Computer Aided Verification: 24th International Conference, CAV 2012 …, 2012 | 150 | 2012 |
An interpolation method for CLP traversal J Jaffar, AE Santosa, R Voicu Principles and Practice of Constraint Programming-CP 2009: 15th …, 2009 | 87 | 2009 |
Unbounded symbolic execution for program verification J Jaffar, JA Navas, AE Santosa Runtime Verification: Second International Conference, RV 2011, San …, 2012 | 61 | 2012 |
Out of sight, out of mind? How vulnerable dependencies affect open-source projects GAA Prana, A Sharma, LK Shar, D Foo, AE Santosa, A Sharma, D Lo Empirical Software Engineering 26, 1-34, 2021 | 59 | 2021 |
A CLP proof method for timed automata J Jaffar, A Santosa, R Voicu 25th IEEE International Real-Time Systems Symposium, 175-186, 2004 | 48 | 2004 |
Efficient Memoization for Dynamic Programming with Ad-Hoc Constraints. J Jaffar, AE Santosa, R Voicu AAAI 8, 297-303, 2008 | 45 | 2008 |
Scalable distributed depth-first search with greedy work stealing J Jaffar, AE Santosa, RHC Yap, KQ Zhu 16th IEEE International Conference on Tools with Artificial Intelligence, 98-103, 2004 | 45 | 2004 |
A machine learning approach for vulnerability curation Y Chen, AE Santosa, AM Yi, A Sharma, A Sharma, D Lo Proceedings of the 17th International Conference on Mining Software …, 2020 | 43 | 2020 |
Automated identification of libraries from vulnerability data Y Chen, AE Santosa, A Sharma, D Lo Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 30 | 2020 |
Path-sensitive backward slicing J Jaffar, V Murali, JA Navas, AE Santosa Static Analysis: 19th International Symposium, SAS 2012, Deauville, France …, 2012 | 23 | 2012 |
A coinduction rule for entailment of recursively defined properties J Jaffar, AE Santosa, R Voicu International Conference on Principles and Practice of Constraint …, 2008 | 21 | 2008 |
Modeling systems in CLP J Jaffar, AE Santosa, R Voicu International conference on logic programming, 412-413, 2005 | 19 | 2005 |
Hermes: Using commit-issue linking to detect vulnerability-fixing commits G Nguyen-Truong, HJ Kang, D Lo, A Sharma, AE Santosa, A Sharma, ... 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 18 | 2022 |
A CLP method for compositional and intermittent predicate abstraction J Jaffar, AE Santosa, R Voicu Verification, Model Checking, and Abstract Interpretation: 7th International …, 2006 | 13 | 2006 |
Concurrent programming made easy R Ramirez, AE Santosa, RHC Yap Proceedings Sixth IEEE International Conference on Engineering of Complex …, 2000 | 12 | 2000 |
Automated identification of libraries from vulnerability data: Can we do better? SA Haryono, HJ Kang, A Sharma, A Sharma, A Santosa, AM Yi, D Lo Proceedings of the 30th IEEE/ACM International Conference on Program …, 2022 | 10 | 2022 |
ApproxSymate: Path sensitive program approximation using symbolic execution H De Silva, AE Santosa, NM Ho, WF Wong Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on …, 2019 | 9 | 2019 |
Method and system for code analysis using symbolic types L Li, A Santosa US Patent 9,336,128, 2016 | 9 | 2016 |
Curracurrong: a stream programming environment for wireless sensor networks V Kakkad, S Attar, AE Santosa, A Fekete, B Scholz Software: Practice and Experience 44 (2), 175-199, 2014 | 9 | 2014 |