Fang Yu
Fang Yu
Associate Professor, Dept. Management Information Systems, National Chengchi University
Dirección de correo verificada de nccu.edu.tw - Página principal
TítuloCitado porAño
Securing web application code by static analysis and runtime protection
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
Proceedings of the 13th international conference on World Wide Web, 40-52, 2004
7582004
Stranger: An automata-based string analysis tool for PHP
F Yu, M Alkhalaf, T Bultan
International Conference on Tools and Algorithms for the Construction and …, 2010
1302010
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
1092013
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
International SPIN Workshop on Model Checking of Software, 306-324, 2008
902008
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 7,779,399, 2010
802010
Verifying web applications using bounded model checking
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
International Conference on Dependable Systems and Networks, 2004, 199-208, 2004
792004
Symbolic string verification: Combining string analysis and size analysis
F Yu, T Bultan, OH Ibarra
International Conference on Tools and Algorithms for the Construction and …, 2009
672009
Patching vulnerabilities with sanitization synthesis
F Yu, M Alkhalaf, T Bultan
Proceedings of the 33rd International Conference on Software Engineering …, 2011
572011
Relational string verification using multi-track automata
F Yu, T Bultan, OH Ibarra
International Journal of Foundations of Computer Science 22 (08), 1909-1924, 2011
542011
Automata-based symbolic string analysis for vulnerability detection
F Yu, M Alkhalaf, T Bultan, OH Ibarra
Formal Methods in System Design 44 (1), 44-70, 2014
512014
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
432013
Topological pattern discovery and feature extraction for fraudulent financial reporting
SY Huang, RH Tsaih, F Yu
Expert Systems with Applications 41 (9), 4360-4372, 2014
422014
TCTL inevitability analysis of dense-time systems: From theory to engineering
F Wang, GD Huang, F Yu
IEEE Transactions on Software Engineering 32 (7), 510-526, 2006
42*2006
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
F Yu, M Alkhalaf, T Bultan
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
412009
On spiking neural P systems and partially blind counter machines
OH Ibarra, S Woodworth, F Yu, A Păun
International Conference on Unconventional Computation, 113-129, 2006
282006
String abstractions for string verification
F Yu, T Bultan, B Hardekopf
International SPIN Workshop on Model Checking of Software, 20-37, 2011
232011
Securing KVM-based cloud systems via virtualization introspection
SW Lee, F Yu
2014 47th Hawaii International Conference on System Sciences, 5028-5037, 2014
222014
String Analysis via Automata Manipulation with Logic Circuit Representation
HE Wang, TL Tsai, CH Lin, F Yu, JHR Jiang
International Conference on Computer Aided Verification, 241-260, 2016
212016
A temporal logic for the interaction of strategies
F Wang, CH Huang, F Yu
International Conference on Concurrency Theory, 466-481, 2011
202011
TCTL inevitability analysis of dense-time systems
F Wang, GD Hwang, F Yu
International Conference on Implementation and Application of Automata, 176-186, 2003
182003
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20