Cited By
View all- Liu CMera AKirda EXu MLu LBalzarotti DXu W(2024)CO3Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699213(5591-5608)Online publication date: 14-Aug-2024
- Zhou ZYang YWu SHuang YChen BPeng XFilkov VRay BZhou M(2024)Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed FuzzingProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695531(1633-1644)Online publication date: 27-Oct-2024
- Wu YHumayun AGulzar MKim M(2024)Natural Symbolic Execution-Based Testing for Big Data AnalyticsProceedings of the ACM on Software Engineering10.1145/36608251:FSE(2677-2700)Online publication date: 12-Jul-2024
- Show More Cited By