Self-repair and distributed-repair of applications

Pietro Ferrara , Marco Pistoia , Omer Tripp , Petar I Tsankov

7
2017
Providing efficient information tracking with dynamically selected precision

Pietro Ferrara , Marco Pistoia , Omer Tripp , Petar I Tsankov

2020
Avoiding Robust Misclassifications for Improved Robustness without Accuracy Loss

Yannick Merkli , Pavol Bielik , PETAR TSANKOV , Martin Vechev

2021
In-depth fuzz testing of IKE implementations

Petar Tsankov , Mohammad Torabi Dashti , David A. Basin
Technical report / Systems Group, Department of Computer Science, ETH Zürich 747

2011
SecFuzz: fuzz-testing security protocols

Petar Tsankov , Mohammad Torabi Dashti , David Basin
automation of software test 1 -7

86
2012
NetComplete: Practical Network Wide Configuration Synthesis with Autocompletion

Laurent Vanbever , Martin T. Vechev , Petar Tsankov , Ahmed El-Hassany
networked systems design and implementation 579 -594

23
2018
NetHide: secure and practical network topology obfuscation

Laurent Vanbever , Martin Vechev , Petar Tsankov , Vincent Lenders
usenix security symposium 693 -709

26
2018
Securify: Practical Security Analysis of Smart Contracts

Martin Vechev , Petar Tsankov , Arthur Gervais , Andrei Dan
arXiv: Cryptography and Security

653
2018
Automated Discovery of Adaptive Attacks on Adversarial Defenses.

Martin T. Vechev , Petar Tsankov , Pavol Bielik , Chengyuan Yao
arXiv: Learning

11
2021
Inferring crypto API rules from code changes

Rumen Paletov , Petar Tsankov , Veselin Raychev , Martin Vechev
Sigplan Notices

1
2018
DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization

Benjamin Bichsel , Timon Gehr , Dana Drachsler-Cohen , Petar Tsankov
computer and communications security 508 -524

27
2018
Debin: Predicting Debug Information in Stripped Binaries

Jingxuan He , Pesho Ivanov , Petar Tsankov , Veselin Raychev
computer and communications security 1667 -1680

24
2018
Statistical Deobfuscation of Android Applications

Benjamin Bichsel , Veselin Raychev , Petar Tsankov , Martin Vechev
computer and communications security 343 -355

138
2016
Network-Wide Configuration Synthesis

Ahmed El-Hassany , Petar Tsankov , Laurent Vanbever , Martin Vechev
computer aided verification 261 -281

30
2017
Force Open

Karl Wüst , Petar Tsankov , Saša Radomirović , Mohammad Torabi Dashti
Digital Investigation 20

1
2017
Decentralized Composite Access Control

Petar Tsankov , Srdjan Marinovic , Mohammad Torabi Dashti , David Basin
principles of security and trust 245 -264

20
2014
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts

Jingxuan He , Mislav Balunović , Nodar Ambroladze , Petar Tsankov
computer and communications security 531 -548

122
2019
Test execution checkpointing for web applications

Marco Guarnieri , Petar Tsankov , Tristan Buchs , Mohammad Torabi Dashti
international symposium on software testing and analysis 203 -214

4
2017
Security Analysis of Smart Contracts in Datalog

Petar Tsankov
leveraging applications of formal methods 316 -322

7
2018
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation

Timon Gehr , Matthew Mirman , Dana Drachsler-Cohen , Petar Tsankov
2018 IEEE Symposium on Security and Privacy (SP) 3 -18

719
2018