Yunhui Zheng
Yunhui Zheng
Co-founder, Sec3
No verified email - Homepage
Cited by
Cited by
Z3-str: A z3-based string solver for web application analysis
Y Zheng, X Zhang, V Ganesh
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
Path sensitive static analysis of web applications for remote code execution vulnerability detection
Y Zheng, X Zhang
2013 35th International Conference on Software Engineering (ICSE), 652-661, 2013
D2a: A dataset built for ai-based vulnerability detection methods using differential analysis
Y Zheng, S Pujar, B Lewis, L Buratti, E Epstein, B Yang, J Laredo, ...
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
Statically locating web application bugs caused by asynchronous calls
Y Zheng, T Bao, X Zhang
Proceedings of the 20th international conference on World wide web, 805-814, 2011
Precise calling context encoding
WN Sumner, Y Zheng, D Weeratunge, X Zhang
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
Exploring software naturalness through neural language models
L Buratti, S Pujar, M Bornea, S McCarley, Y Zheng, G Rossiello, A Morari, ...
arXiv preprint arXiv:2006.12641, 2020
J-force: Forced execution on javascript
K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng, X Zhang, D Xu
Proceedings of the 26th international conference on World Wide Web, 897-906, 2017
Automatic text input generation for mobile testing
P Liu, X Zhang, M Pistoia, Y Zheng, M Marques, L Zeng
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Z3str3: A string solver with theory-aware heuristics
M Berzish, V Ganesh, Y Zheng
2017 Formal Methods in Computer Aided Design (FMCAD), 55-59, 2017
Stringfuzz: A fuzzer for string solvers
D Blotsky, F Mora, M Berzish, Y Zheng, I Kabir, V Ganesh
Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018
Strict control dependence and its effect on dynamic information flow analyses
T Bao, Y Zheng, Z Lin, X Zhang, D Xu
Proceedings of the 19th international symposium on Software testing and …, 2010
Z3str2: an efficient solver for strings, regular expressions, and length constraints
Y Zheng, V Ganesh, S Subramanian, O Tripp, M Berzish, J Dolby, ...
Formal Methods in System Design 50, 249-288, 2017
Effective search-space pruning for solvers of string equations, regular expressions and length constraints
Y Zheng, V Ganesh, S Subramanian, O Tripp, J Dolby, X Zhang
Computer Aided Verification: 27th International Conference, CAV 2015, San …, 2015
Statically checking web API requests in JavaScript
E Wittern, ATT Ying, Y Zheng, J Dolby, JA Laredo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Opportunities in software engineering research for web API consumption
E Wittern, ATT Ying, Y Zheng, JA Laredo, J Dolby, CC Young, ...
2017 IEEE/ACM 1st International Workshop on API Usage and Evolution (WAPI), 7-10, 2017
WebRanz: Web Page Randomization For Better Advertisement Delivery and Web-Bot Prevention
W Wang, Y Zheng, X Xing, Y Kwon, X Zhang, P Eugster
Proceedings of the 24th ACM SIGSOFT International Symposium on the …, 2016
Static detection of resource contention problems in server-side scripts
Y Zheng, X Zhang
2012 34th International Conference on Software Engineering (ICSE), 584-594, 2012
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements
Y Ding, S Suneja, Y Zheng, J Laredo, A Morari, G Kaiser, B Ray
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
Learning to map source code to software vulnerability using code-as-a-graph
S Suneja, Y Zheng, Y Zhuang, J Laredo, A Morari
arXiv preprint arXiv:2006.08614, 2020
Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection
A Romano, Y Zheng, W Wang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20