Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David BrumleyComputer Science, Carnegie Mellon UniversityVerified email at cmu.edu
Thanassis AvgerinosForAllSecure, Inc.Verified email at forallsecure.com
Maverick WooSystems Scientist, Carnegie Mellon UniversityVerified email at cmu.edu
Sang Kil ChaSchool of Computing, KAISTVerified email at kaist.ac.kr
Claire Le GouesCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jeremy LacomisPh.D. Student, Carnegie Mellon UniversityVerified email at cmu.edu
Choongwoo HanMicrosoftVerified email at microsoft.com
Manuel EgeleBoston UniversityVerified email at bu.edu
Valentin J.M. ManèsInformation Security ResearcherVerified email at kaist.ac.kr
HyungSeok HanKAISTVerified email at kaist.ac.kr
Stephanie Elzer SchwartzMillersville UniversityVerified email at millersville.edu
Bogdan VasilescuAssociate Professor at Carnegie Mellon UniversityVerified email at cmu.edu
Graham NeubigCarnegie Mellon University, Inspired CognitionVerified email at cs.cmu.edu
Jorge A NavasCertoraVerified email at certora.com
Arie GurfinkelUniversity of WaterlooVerified email at uwaterloo.ca