Zhendong Su
TitleCited byYear
Deckard: Scalable and accurate tree-based detection of code clones
L Jiang, G Misherghi, Z Su, S Glondu
Proceedings of the 29th international conference on Software Engineering, 96-105, 2007
8032007
The essence of command injection attacks in web applications
Z Su, G Wassermann
Acm Sigplan Notices 41 (1), 372-382, 2006
6732006
FIREMAN: A toolkit for firewall modeling and analysis
L Yuan, J Mai, Z Su, H Chen, CN Chuah, P Mohapatra
Security and Privacy, 2006 IEEE Symposium on, 15 pp.-213, 2006
5212006
On the naturalness of software
A Hindle, ET Barr, Z Su, M Gabel, P Devanbu
2012 34th International Conference on Software Engineering (ICSE), 837-847, 2012
4742012
Sound and precise analysis of web applications for injection vulnerabilities
G Wassermann, Z Su
ACM Sigplan Notices 42 (6), 32-41, 2007
4522007
Static detection of cross-site scripting vulnerabilities
G Wassermann, Z Su
2008 ACM/IEEE 30th International Conference on Software Engineering, 171-180, 2008
4152008
Scalable detection of semantic clones
M Gabel, L Jiang, Z Su
Proceedings of the 30th international conference on Software engineering …, 2008
3212008
Partial online cycle elimination in inclusion constraint graphs
M Fähndrich, JS Foster, Z Su, A Aiken
ACM SIGPLAN Notices 33 (5), 85-96, 1998
2501998
Static checking of dynamically generated queries in database applications
C Gould, Z Su, P Devanbu
Proceedings. 26th International Conference on Software Engineering, 645-654, 2004
2372004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2262005
Dynamic test input generation for web applications
G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura, Z Su
Proceedings of the 2008 international symposium on Software testing and …, 2008
2102008
Javert: fully automatic mining of general temporal properties from dynamic traces
M Gabel, Z Su
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008
1832008
Compiler validation via equivalence modulo inputs
V Le, M Afshari, Z Su
ACM SIGPLAN Notices 49 (6), 216-226, 2014
1822014
Context-based detection of clone-related bugs
L Jiang, Z Su, E Chiu
Proceedings of the the 6th joint meeting of the European software …, 2007
1822007
HDD: hierarchical delta debugging
G Misherghi, Z Su
Proceedings of the 28th international conference on Software engineering …, 2006
1792006
JDBC checker: A static analysis tool for SQL/JDBC applications
C Gould, Z Su, P Devanbu
Proceedings. 26th International Conference on Software Engineering, 697-698, 2004
1712004
A study of the uniqueness of source code
M Gabel, Z Su
Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010
1562010
Deciding properties for message sequence charts
A Muscholl, D Peled, Z Su
International Conference on Foundations of Software Science and Computation …, 1998
1551998
Detecting code clones in binary executables
A Sæbjørnsen, J Willcock, T Panas, D Quinlan, Z Su
Proceedings of the eighteenth international symposium on Software testing …, 2009
1522009
An analysis framework for security in web applications
G Wassermann, Z Su
Proceedings of the FSE Workshop on Specification and Verification of …, 2004
1432004
The system can't perform the operation now. Try again later.
Articles 1–20