Follow
Peisen Yao
Title
Cited by
Cited by
Year
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning
H Huang, Y Guo, Q Shi, P Yao, R Wu, C Zhang
S&P, 2022
1022022
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction
H Huang, P Yao, R Wu, Q Shi, C Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1199-1213, 2020
922020
Path-sensitive sparse analysis without path conditions
Q Shi, P Yao, R Wu, C Zhang
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
302021
Canary: practical static detection of inter-thread value-flow bugs
Y Cai, P Yao, C Zhang
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
252021
Fuzzing SMT solvers via two-dimensional input space exploration
P Yao, H Huang, W Tang, Q Shi, R Wu, C Zhang
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
222021
Skeletal approximation enumeration for smt solver testing
P Yao, H Huang, W Tang, Q Shi, R Wu, C Zhang
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
192021
Program Analysis via Efficient Symbolic Abstraction
P YAO, Q SHI, H HEQING, Z CHARLES
132021
Fast bit-vector satisfiability
P Yao, Q Shi, H Huang, C Zhang
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
122020
Complexity-Guided Container Replacement Synthesis
C WANG, P YAO, W TANG, Q SHI, Z CHARLES
OOPSLA, 2022
92022
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation
C Wang, W Wang, P Yao, Q Shi, J Zhou, X Xiao, C Zhang
ACM Transactions on Software Engineering and Methodology 32 (3), 1-39, 2023
82023
Indexing the extended dyck-cfl reachability for context-sensitive program analysis
Q Shi, Y Wang, P Yao, C Zhang
Proceedings of the ACM on Programming Languages 6 (OOPSLA2), 1438-1468, 2022
82022
Titan: efficient multi-target directed greybox fuzzing
H Huang, P Yao, HC Chiu, Y Guo, C Zhang
2024 IEEE Symposium on Security and Privacy (SP), 1849-1864, 2024
72024
Balance seed scheduling via monte carlo planning
H Huang, HC Chiu, Q Shi, P Yao, C Zhang
IEEE Transactions on Dependable and Secure Computing 21 (3), 1469-1483, 2023
72023
Place your locks well: understanding and detecting lock misuse bugs
Y Cai, P Yao, C Ye, C Zhang
32nd USENIX Security Symposium (USENIX Security 23), 3727-3744, 2023
72023
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning
P Ma, Z Ji, P Yao, S Wang, K Ren
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
42024
Verifying data constraint equivalence in fintech systems
C Wang, G Fan, P Yao, F Pan, C Zhang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
42023
Precise Divide-By-Zero Detection with Affirmative Evidence
Y Guo, J Zhou, P Yao, Q Shi, C Zhang
ICSE, 2022
32022
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions
W Tang, D Dong, S Li, C Wang, P Yao, J Zhou, C Zhang
ACM Transactions on Software Engineering and Methodology 33 (3), 1-33, 2024
22024
Efficient path-sensitive data-dependence analysis
P Yao, J Zhou, X Xiao, Q Shi, R Wu, C Zhang
arXiv preprint arXiv:2109.07923, 2021
22021
Duplicate-sensitivity Guided Transformation Synthesis for DBMS Correctness Bug Detection
Y Zhang, P Yao, R Wu, C Zhang
arXiv preprint arXiv:2107.03660, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20