Author:
Georgiev Martin,Iyengar Subodh,Jana Suman,Anubhai Rishita,Boneh Dan,Shmatikov Vitaly
Cited by
199 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ProveNFix: Temporal Property-Guided Program Repair;Proceedings of the ACM on Software Engineering;2024-07-12
2. An Investigation into Misuse of Java Security APIs by Large Language Models;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. A Comprehensive Study of Cyber Threats in the Banking Industry;Advances in Business Information Systems and Analytics;2024-04-26
5. Boosting API Misuse Detection via Integrating API Constraints from Multiple Sources;Proceedings of the 21st International Conference on Mining Software Repositories;2024-04-15