Out of Sight, Out of Place: Detecting and Assessing Swapped Arguments20th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2020, Adelaide, Australia, September 28 - October 2, 2020, link, bibtex
Roger Scott, Joseph Ranieri, Lucja Kot and Vineeth Kashyap
API analytics for curating static analysis rulesProceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis, TAPAS@SPLASH 2020, Virtual Event, USA, November 17, 2020, link, bibtex
Vineeth Kashyap, Roger Scott, Joseph Ranieri, David Melski and Lucja Kot
GTIRB: Intermediate Representation for Binaries, link, bibtex
Eric M. Schulte, Jonathan Dorn, Antonio Flores-Montoya, Aaron Ballman and Tom Johnson
Inuring: Live Attacker-guided RepairWorkshop on Forming an Ecosystem Around Software Transformation (FEAST)
Eric Schulte Suan Yong and Dave Melski
SARIF-enabled tooling to encourage gradual technical debt reductionProceedings of the Second International Conference on Technical Debt, TechDebt@ICSE 2019, Montreal, QC, Canada, May 26-27, 2019, link, bibtex
Paul Anderson, Lucja Kot, Neil Gilmore and David Vitek
Automated Customized Bug-Benchmark Generation19th International Working Conference on Source Code Analysis and Manipulation, SCAM 2019, Cleveland, OH, USA, September 30 - October 1, 2019 (distinguished paper), link, bibtex
Vineeth Kashyap, Jason Ruchti, Lucja Kot, Emma Turetsky, Rebecca Swords, Shih An Pan, Julien Henry, David Melski and Eric M. Schulte
The State and Future of Genetic Improvement, link, bibtex
William B. Langdon, Westley Weimer, Christopher Steven Timperley, Oliver Krauss, Zhen Yu Ding, Yiwei Lyu, Nicolas Chausseau, Eric M. Schulte, Shin Hwei Tan, Kevin Leach, Yu Huang and Gabin An
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge, link, bibtex
Anh Nguyen-Tuong, David Melski, Jack W. Davidson, Michele Co, William H. Hawkins, Jason D. Hiser, Derek Morris, Ducson Nguyen and Eric Rizzi
A spoonful of DevOps helps the GI go downProceedings of the 4th International Genetic Improvement Workshop, GI@ICSE 2018, Gothenburg, Sweden, June 2, 2018, link, bibtex
Benoit Baudry, Nicolas Harr, , Eric M. Schulte, Chris Timperley, Shin Hwei Tan, Marija Selakovic and Emamurho Ugherughe
Using recurrent neural networks for decompilation25th International Conference on Software Analysis, Evolution and Reengineering, SANER 2018, Campobasso, Italy, March 20-23, 2018, link, bibtex
Deborah S. Katz, Jason Ruchti and Eric M. Schulte
Evolving Exact DecompilationBinary Analysis Research (BAR), 2018
Eric Schulte, Jason Ruchti, Matt Noonan, David Ciarletta and Alexey Loginov
The Surprising Creativity of Digital Evolution: A Collection of Anecdotes from the Evolutionary Computation and Artificial Life Research Communities, link, bibtex
Joel Lehman, Jeff Clune, Dusan Misevic, Christoph Adami, Lee Altenberg, Julie Beaulieu, Peter J. Bentley, Samuel Bernard, Guillaume Beslon, David M. Bryson, Patryk Chrabaszcz, Nick Cheney, Antoine Cully, St'ephane Doncieux, Fred C. Dyer, Kai Olav Ellefsen, Robert Feldt, Stephan Fischer, Stephanie Forrest, Antoine Fŕenoy, Christian Gagńe, Leni K. Le Goff, Laura M. Grabowski, Babak Hodjat, Frank Hutter, Laurent Keller, Carole Knibbe, Peter Krcah, Richard E. Lenski, Hod Lipson, Robert MacCurdy, Carlos Maestre, Risto Miikkulainen, Sara Mitri, David E. Moriarty, Jean-Baptiste Mouret, Anh Nguyen, Charles Ofria, Marc Parizeau, David P. Parsons, Robert T. Pennock, William F. Punch, Thomas S. Ray, Marc Schoenauer, Eric Schulte, Karl Sims, Kenneth O. Stanley, François Taddei, Danesh Tarapore, Simon Thibault, Westley Weimer, Richard A. Watson and Jason Yosinski
Program splicingProceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018, link, bibtex
Yanxin Lu, Swarat Chaudhuri, Chris Jermaine and David Melski
Vertx: Automated Validation of Binary TransformationsProceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017, link, bibtex
Denis Gopan, Peter Ohmann and David Melski
Source Forager: A Search Engine for Similar Source Code, link, bibtex
Vineeth Kashyap, David Bingham Brown, Ben Liblit, David Melski and Thomas W. Reps
MuSynth: Program Synthesis via Code Reuse and Code ManipulationSearch Based Software Engineering - 9th International Symposium, SSBSE 2017, Paderborn, Germany, September 9-11, 2017, Proceedings, link, bibtex
Vineeth Kashyap, Rebecca Swords, Eric M. Schulte and David Melski
Yanxin Lu, Swarat Chaudhuri, Chris Jermaine and David Melski
Software Transformation: Applications, Tools, Challenges, and Program RepresentationWorkshop on Forming an Ecosystem Around Software Transformation (FEAST)
Eric Schulte, Michael McDougall and Dave Melski
Polymorphic type inference for machine codeProceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, Santa Barbara, CA, USA, June 13-17, 2016, link, bibtex
Matthew Noonan, Alexey Loginov and David Cok
Exploiting and Protecting Dynamic Code Generation22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015, link, bibtex
Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee and David Melski
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1, link, bibtex
Denis Gopan, Evan Driscoll, Ducson Nguyen, Dimitri Naydich, Alexey Loginov and David Melski
Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software RepairGenetic and Evolutionary Computation Conference, GECCO 2015, Madrid, Spain, July 11-15, 2015, Companion Material Proceedings (best paper), link, bibtex
Eric M. Schulte, Westley Weimer and Stephanie Forrest
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing2014 Tenth European Dependable Computing Conference, Newcastle, United Kingdom, May 13-16, 2014, link, bibtex
Anh Nguyen-Tuong, Jason Hiser, Michele Co, Nathan Kennedy, David Melski, William Ella, David Hyde, Jack W. Davidson and John C. Knight
PEASOUP: preventing exploits against software of uncertain provenance (position paper)Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, link, bibtex
Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde and Brian Mastropietro
Analysis Techniques for Information Security, link, bibtex
Anupam Datta, Somesh Jha, Ninghui Li, David Melski and Thomas W. Reps
A relational approach to interprocedural shape analysis, link, bibtex
Bertr, Jeannet, Alexey Loginov, Thomas W. Reps and Mooly Sagiv
Finite differencing of logical formulas for static analysis, link, bibtex
Thomas W. Reps, Mooly Sagiv and Alexey Loginov
Verifying dereference safety via expanding-scope analysisProceedings of the 2008 international symposium on Software testing and analysis, link
Loginov, Alexey, Yahav, Eran, Ch, ra, Satish, Fink, Stephen, Rinetzky, Noam, N and a, Mangala
Improving Reliability and Security by Analyzing Executables
Melski, David
Guided Static AnalysisStatic Analysis, 14th International Symposium, SAS 2007, Kongens Lyngby, Denmark, August 22-24, 2007, Proceedings, link, bibtex
Denis Gopan and Thomas W. Reps
WYSINWYX: What You See Is Not What You eXecuteVerified Software: Theories, Tools, Experiments, First IFIP TC 2/WG 2.3 Conference, VSTTE 2005, Zurich, Switzerland, October 10-13, 2005, Revised Selected Papers and Discussions, link, bibtex
Gogul Balakrishnan, Thomas W. Reps, David Melski and Tim Teitelbaum
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings, link, bibtex
Gogul Balakrishnan, Thomas W. Reps, Nicholas Kidd, Akash Lal, Junghee Lim, David Melski, Radu Gruian, Suan Hsi Yong, Chi-Hua Chen and Tim Teitelbaum
Weighted pushdown systems and their application to interprocedural dataflow analysis, link, bibtex
Thomas W. Reps, Stefan Schwoon, Somesh Jha and David Melski
The Interprocedural Express-Lane TransformationCompiler Construction, 12th International Conference, CC 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings, link, bibtex
David Melski and Thomas W. Reps
Buffer overrun detection using linear programming and static analysisProceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, link, bibtex
Vinod Ganapathy, Somesh Jha, David Ch, ler, David Melski and David Vitek