Tevfik Bultan
◁ ▶ joint publications with coauthor community group 1
- > Home > Persons > Tevfik Bultan
Publications
- 2018
- [j36]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. ACM SIGSOFT Software Engineering Notes 43(4): 56 (2018) - [c101]Nestan Tsiskaridze, Lucas Bang, Joseph McMahan, Tevfik Bultan, Timothy Sherwood:
Information Leakage in Arbiter Protocols. ATVA 2018: 404-421 - [c100]Lucas Bang, Nicolás Rosner, Tevfik Bultan:
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. EuroS&P 2018: 307-322 - [c99]Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:
Static detection of API call vulnerabilities in iOS executables. ICSE (Companion Volume) 2018: 394-395 - [c98]Tegan Brennan, Seemanta Saha, Tevfik Bultan:
Symbolic path cost analysis for side-channel detection. ICSE (Companion Volume) 2018: 424-425 - [c97]Tegan Brennan, Seemanta Saha, Tevfik Bultan, Corina S. Pasareanu:
Symbolic path cost analysis for side-channel detection. ISSTA 2018: 27-37 - [c96]Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. ESEC/SIGSOFT FSE 2018: 400-410 - 2017
- [b1]Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin:
String Analysis for Software Verification and Security. Springer 2017, ISBN 978-3-319-68668-4, pp. 1-166 - [j35]Tevfik Bultan, Andreas Zeller:
Guest editorial: emerging areas in automated software engineering research. Autom. Softw. Eng. 24(4): 863-864 (2017) - [c95]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. CSF 2017: 328-342 - [c93]Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan:
Constraint normalization and parameterized caching for quantitative program analysis. ESEC/SIGSOFT FSE 2017: 535-546 - [e7]Tevfik Bultan, Koushik Sen:
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017. ACM 2017, ISBN 978-1-4503-5076-1 [contents] - [i1]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. IACR Cryptology ePrint Archive 2017: 401 (2017) - 2016
- [j34]Samik Basu, Tevfik Bultan:
On deciding synchronizability for asynchronously communicating systems. Theor. Comput. Sci. 656: 60-75 (2016) - [c92]
- [c90]Fang Yu, Ching-Yuan Shueh, Chun-Han Lin, Yu-Fang Chen, Bow-Yaw Wang, Tevfik Bultan:
Optimal sanitization synthesis for web application vulnerability repair. ISSTA 2016: 189-200 - [c88]Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan:
String analysis for side channels with segmented oracles. SIGSOFT FSE 2016: 193-204 - 2015
- [j33]Jian Lu, David S. Rosenblum, Tevfik Bultan, Valérie Issarny, Schahram Dustdar, Margaret-Anne D. Storey, Dongmei Zhang:
Roundtable: The Future of Software Engineering for Internet Computing. IEEE Software 32(1): 91-97 (2015) - [c87]Abdulbaki Aydin, Lucas Bang, Tevfik Bultan:
Automata-Based Model Counting for String Constraints. CAV (1) 2015: 255-272 - [c83]Lucas Bang, Abdulbaki Aydin, Tevfik Bultan:
Automatically computing path complexity of programs. ESEC/SIGSOFT FSE 2015: 61-72 - 2014
- [j31]Fang Yu, Muath Alkhalaf, Tevfik Bultan, Oscar H. Ibarra:
Automata-based symbolic string analysis for vulnerability detection. Formal Methods in System Design 44(1): 44-70 (2014) - [c81]Chandra Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, Alexander Pucher, Rich Wolski, Tevfik Bultan:
Cloud Platform Support for API Governance. IC2E 2014: 615-618 - [c79]Abdulbaki Aydin, Muath Alkhalaf, Tevfik Bultan:
Automated Test Generation from Vulnerability Signatures. ICST 2014: 193-202 - [c78]Muath Alkhalaf, Abdulbaki Aydin, Tevfik Bultan:
Semantic differential repair for input validation and sanitization. ISSTA 2014: 225-236 - [c77]Samik Basu, Tevfik Bultan:
Automatic verification of interactions in asynchronous systems with unbounded buffers. ASE 2014: 743-754 - 2013
- [c76]Meriem Ouederni, Gwen Salaün, Tevfik Bultan:
Compatibility Checking for Asynchronously Communicating Software. FACS 2013: 310-328 - [e6]Ewen Denney, Tevfik Bultan, Andreas Zeller:
2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013. IEEE 2013 [contents] - 2012
- [j30]Gwen Salaün, Tevfik Bultan, Nima Roohi:
Realizability of Choreographies Using Process Algebra Encodings. IEEE Trans. Services Computing 5(3): 290-304 (2012) - [c72]Muath Alkhalaf, Tevfik Bultan, Jose L. Gallegos:
Verifying client-side input validation functions using string analysis. ICSE 2012: 947-957 - [c71]Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazzini, Tevfik Bultan, Alessandro Orso, Christopher Kruegel:
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies. ISSTA 2012: 56-66 - [c69]
- [c68]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Synchronizability for Verification of Asynchronously Communicating Systems. VMCAI 2012: 56-71 - [e5]Will Tracz, Martin P. Robillard, Tevfik Bultan:
20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT/FSE'12, Cary, NC, USA - November 11 - 16, 2012. ACM 2012, ISBN 978-1-4503-1614-9 [contents] - 2011
- [j29]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-Track Automata. Int. J. Found. Comput. Sci. 22(8): 1909-1924 (2011) - [c67]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Patching vulnerabilities with sanitization synthesis. ICSE 2011: 251-260 - [c65]Fang Yu, Tevfik Bultan, Ben Hardekopf:
String Abstractions for String Verification. SPIN 2011: 20-37 - [c64]
- 2010
- [j28]Sylvain Hallé, Tevfik Bultan, Graham Hughes, Muath Alkhalaf, Roger Villemaire:
Runtime Verification of Web Service Interface Contracts. IEEE Computer 43(3): 59-66 (2010) - [c63]Sylvain Hallé, Taylor Ettema, Chris Bunch, Tevfik Bultan:
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. ASE 2010: 235-244 - [c62]Tevfik Bultan, Fang Yu, Aysu Betin-Can:
Modular verification of synchronization with reentrant locks. MEMOCODE 2010: 59-68 - [c61]Sylvain Hallé, Tevfik Bultan:
Realizability analysis for message-based interactions using shared-state projections. SIGSOFT FSE 2010: 27-36 - [c59]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Stranger: An Automata-Based String Analysis Tool for PHP. TACAS 2010: 154-157 - [c58]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-track Automata. CIAA 2010: 290-299 - 2009
- [j27]Tuba Yavuz-Kahveci, Tevfik Bultan:
Action Language verifier: an infinite-state model checker for reactive software specifications. Formal Methods in System Design 35(3): 325-367 (2009) - [c56]Sylvain Hallé, Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Generating Interface Grammars from WSDL for Automated Verification of Web Services. ICSOC/ServiceWave 2009: 516-530 - [c55]Tevfik Bultan, Chris Ferguson, Xiang Fu:
A Tool for Choreography Analysis Using Collaboration Diagrams. ICWS 2009: 856-863 - [c54]Gwen Salaün, Tevfik Bultan:
Realizability of Choreographies Using Process Algebra Encodings. IFM 2009: 167-182 - [c52]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. ASE 2009: 605-609 - [c51]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336 - 2008
- [j25]Tevfik Bultan, Xiang Fu:
Choreography Modeling and Analysis with Collaboration Diagrams. IEEE Data Eng. Bull. 31(3): 27-30 (2008) - [j24]Tevfik Bultan, Xiang Fu:
Specification of realizable service conversations using collaboration diagrams. Service Oriented Computing and Applications 2(1): 27-39 (2008) - [j23]Graham Hughes, Tevfik Bultan:
Automated verification of access control policies using a SAT solver. STTT 10(6): 503-520 (2008) - [j22]Graham Hughes, Tevfik Bultan:
Interface Grammars for Modular Software Model Checking. IEEE Trans. Software Eng. 34(5): 614-632 (2008) - [c49]Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Client and server verification for web services using interface grammars. TAV-WEB 2008: 40-46 - [c48]Tevfik Bultan, Tao Xie:
Workshop on testing, analysis and verification of web software (TAV-WEB 2008). ISSTA 2008: 311-312 - [c47]Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan:
Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202 - [c46]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra:
Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324 - [e2]Tevfik Bultan, Tao Xie:
Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), TAV-WEB 2008, Seattle, Washington, USA, July 21, 2008. ACM 2008, ISBN 978-1-60558-053-1 [contents] - 2007
- [j21]Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Eliminating synchronization faults in air traffic control software via design for verification with concurrency controllers. Autom. Softw. Eng. 14(2): 129-178 (2007) - [j20]Mikael Lindvall, Ioana Rus, Paolo Donzelli, Atif M. Memon, Marvin V. Zelkowitz, Aysu Betin-Can, Tevfik Bultan, Christopher Ackermann, Bettina Anders, Sima Asgari, Victor R. Basili, Lorin Hochstein, Jörg Fellmann, Forrest Shull, Roseanne Tesoriero Tvedt, Daniel Pech, Daniel Hirschbach:
Experimenting with software testbeds for evaluating new technologies. Empirical Software Engineering 12(4): 417-444 (2007) - [j19]Aysu Betin-Can, Tevfik Bultan:
Highly dependable concurrent programming using design for verification. Formal Asp. Comput. 19(2): 243-268 (2007) - [c45]Graham Hughes, Tevfik Bultan:
Interface grammars for modular software model checking. ISSTA 2007: 39-49 - [c43]Fang Yu, Tevfik Bultan, Erik Peterson:
Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340 - [c42]Tevfik Bultan, Xiang Fu:
Specification of Realizable Service Conversations Using Collaboration Diagrams. SOCA 2007: 122-132 - [c41]Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zhao:
Towards a Theory of Web Service Choreographies. WS-FM 2007: 1-16 - [p1]Tevfik Bultan, Xiang Fu, Jianwen Su:
Analyzing Conversations: Realizability, Synchronizability, and Verification. Test and Analysis of Web Services 2007: 57-85 - 2006
- [j18]Tevfik Bultan, Jianwen Su, Xiang Fu:
Analyzing Conversations of Web Services. IEEE Internet Computing 10(1): 18-25 (2006) - [j17]Constantinos Bartzis, Tevfik Bultan:
Efficient BDDs for bounded arithmetic constraints. STTT 8(1): 26-36 (2006) - 2005
- [j16]Xiang Fu, Tevfik Bultan, Jianwen Su:
Realizability of Conversation Protocols with Message Contents. Int. J. Web Service Res. 2(4): 68-93 (2005) - [j15]Shriram Krishnamurthi, Tevfik Bultan:
Discussion summary: characteristics of web services and their impact on testing, analysis and verification. ACM SIGSOFT Software Engineering Notes 30(1): 5 (2005) - [j14]Xiang Fu, Tevfik Bultan, Jianwen Su:
Synchronizability of Conversations among Web Services. IEEE Trans. Software Eng. 31(12): 1042-1055 (2005) - [c39]Tuba Yavuz-Kahveci, Constantinos Bartzis, Tevfik Bultan:
Action Language Verifier, Extended. CAV 2005: 413-417 - [c38]Aysu Betin-Can, Tevfik Bultan:
Verifiable Web Services with Hierarchical Interfaces. ICWS 2005: 85-94 - [c37]
- [c36]Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Application of design for verification with concurrency controllers to air traffic control software. ASE 2005: 14-23 - [c35]Tuba Yavuz-Kahveci, Tevfik Bultan:
Verification of parameterized hierarchical state machines using action language verifier. MEMOCODE 2005: 79-88 - [c33]Tevfik Bultan, Aysu Betin-Can:
Scalable Software Model Checking Using Design for Verification. VSTTE 2005: 337-346 - [c32]Aysu Betin-Can, Tevfik Bultan, Xiang Fu:
Design for verification for asynchronously communicating Web services. WWW 2005: 750-759 - 2004
- [j13]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004) - [j12]Xiang Fu, Tevfik Bultan, Jianwen Su:
Conversation protocols: a formalism for specification and verification of reactive electronic services. Theor. Comput. Sci. 328(1-2): 19-37 (2004) - [c31]Tevfik Bultan, Xiang Fu, Jianwen Su:
Tools for Automated Verification of Web Services. ATVA 2004: 8-10 - [c30]
- [c29]Xiang Fu, Tevfik Bultan, Jianwen Su:
WSAT: A Tool for Formal Analysis of Web Services. CAV 2004: 510-514 - [c28]Xiang Fu, Tevfik Bultan, Jianwen Su:
Realizability of Conversation Protocols With Message Contents. ICWS 2004: 96- - [c27]
- [c26]Aysu Betin-Can, Tevfik Bultan:
Verifiable Concurrent Programming Using Concurrency Controllers. ASE 2004: 248-257 - [c24]
- 2003
- [j11]Aysu Betin-Can, Tevfik Bultan:
Interface-Based Specification and Verification of Concurrency Controllers. Electr. Notes Theor. Comput. Sci. 89(3): 464-479 (2003) - [j10]Constantinos Bartzis, Tevfik Bultan:
Efficient Symbolic Representations for Arithmetic Constraints in Verification. Int. J. Found. Comput. Sci. 14(4): 605-624 (2003) - [j9]Tuba Yavuz-Kahveci, Tevfik Bultan:
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types. STTT 5(1): 15-33 (2003) - [c23]Constantinos Bartzis, Tevfik Bultan:
Efficient Image Computation in Infinite State Model Checking. CAV 2003: 249-261 - [c22]Constantinos Bartzis, Tevfik Bultan:
Construction of Efficient BDDs for Bounded Arithmetic Constraints. TACAS 2003: 394-408 - [c21]Xiang Fu, Tevfik Bultan, Jianwen Su:
Conversation Protocols: A Formalism for Specification and Verification of Reactive Electronic Services. CIAA 2003: 188-200 - [c20]Tevfik Bultan, Xiang Fu, Richard Hull, Jianwen Su:
Conversation specification: a new approach to design and analysis of e-service composition. WWW 2003: 403-410 - 2002
- [j8]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002) - [c19]Tuba Yavuz-Kahveci, Tevfik Bultan:
Heuristics for Efficient Manipulation of Composite Constraints. FroCoS 2002: 57-71 - [c18]Tuba Yavuz-Kahveci, Tevfik Bultan:
Specification, verification, and synthesis of concurrency control components. ISSTA 2002: 169-179 - [c17]Tuba Yavuz-Kahveci, Tevfik Bultan:
Automated Verification of Concurrent Linked Lists with Counters. SAS 2002: 69-84 - [c16]Xiang Fu, Tevfik Bultan, Jianwen Su:
Formal Verification of e-Services and Workflows. WES 2002: 188-202 - [c15]Constantinos Bartzis, Tevfik Bultan:
Automata-Based Representations for Arithmetic Constraints in Automated Verification. CIAA 2002: 282-288 - 2001
- [j7]Oscar H. Ibarra, Tevfik Bultan, Jianwen Su:
On Reachability and Safety in Infinite-State Systems. Int. J. Found. Comput. Sci. 12(6): 821-836 (2001) - [c14]Giorgio Delzanno, Tevfik Bultan:
Constraint-Based Verification of Client-Server Protocols. CP 2001: 286-301 - [c13]
- [c12]Tuba Yavuz-Kahveci, Murat Tuncer, Tevfik Bultan:
A Library for Composite Symbolic Representations. TACAS 2001: 52-66 - [c11]Xiang Fu, Tevfik Bultan, Richard Hull, Jianwen Su:
Verification of Vortex Workflows. TACAS 2001: 143-157 - [c10]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past Pushdown Timed Automata. CIAA 2001: 74-86 - 2000
- [c9]Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84 - [c8]Oscar H. Ibarra, Tevfik Bultan, Jianwen Su:
Reachability Analysis for Some Models of Infinite-State Transition Systems. CONCUR 2000: 183-198 - [c6]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
last updated on 2019-02-14 20:33 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint