Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhemin Yang
@article{DBLP:journals/tifs/LiYYLY24, author = {Shuai Li and Zhemin Yang and Yunteng Yang and Dingyi Liu and Min Yang}, title = {Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3135--3147}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356197}, doi = {10.1109/TIFS.2024.3356197}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiYYLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DengYZYHZY23, author = {Peng Deng and Zhemin Yang and Lei Zhang and Guangliang Yang and Wenzheng Hong and Yuan Zhang and Min Yang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1272--1286}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623103}, doi = {10.1145/3576915.3623103}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DengYZYHZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiY0ZHH023, author = {Shuai Li and Zhemin Yang and Guangliang Yang and Hange Zhang and Nan Hua and Yurui Huang and Min Yang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Notice the Imposter! {A} Study on User Tag Spoofing Attack in Mobile Apps}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5485--5501}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-shuai}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiY0ZHH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYH000022, author = {Shuai Li and Zhemin Yang and Nan Hua and Peng Liu and Xiaohan Zhang and Guangliang Yang and Min Yang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Collect Responsibly But Deliver Arbitrarily?: {A} Study on Cross-User Privacy Leakage in Mobile Apps}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1887--1900}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559371}, doi = {10.1145/3548606.3559371}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiYH000022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HongYYLD0D22, author = {Geng Hong and Zhemin Yang and Sen Yang and Xiaojing Liao and Xiaolin Du and Min Yang and Haixin Duan}, title = {Analyzing Ground-Truth Data of Mobile Gambling Scams}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2176--2193}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833665}, doi = {10.1109/SP46214.2022.9833665}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/HongYYLD0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PanZYZY22, author = {Xudong Pan and Mi Zhang and Yifan Yan and Jiaming Zhu and Zhemin Yang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3989--4006}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/pan-exploring}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/PanZYZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhouYQ000022, author = {Shunfan Zhou and Zhemin Yang and Dan Qiao and Peng Liu and Min Yang and Zhe Wang and Chenggang Wu}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4365--4382}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhou-shunfan}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhouYQ000022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangZXWWZXYY20, author = {Zheyue Jiang and Yuan Zhang and Jun Xu and Qi Wen and Zhenghe Wang and Xiaohan Zhang and Xinyu Xing and Min Yang and Zhemin Yang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {PDiff: Semantic-based Patch Presence Testing for Downstream Kernels}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1149--1163}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417240}, doi = {10.1145/3372297.3417240}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiangZXWWZXYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Xia0ZCWZCHZ0Y20, author = {Hao Xia and Yuan Zhang and Yingtian Zhou and Xiaoting Chen and Yang Wang and Xiangyu Zhang and Shuaishuai Cui and Geng Hong and Xiaohan Zhang and Min Yang and Zhemin Yang}, editor = {Gregg Rothermel and Doo{-}Hwan Bae}, title = {How Android developers handle evolution-induced {API} compatibility issues: a large-scale study}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020}, pages = {886--898}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377811.3380357}, doi = {10.1145/3377811.3380357}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Xia0ZCWZCHZ0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HeZYCLLYZYZD20, author = {Yuyu He and Lei Zhang and Zhemin Yang and Yinzhi Cao and Keke Lian and Shuai Li and Wei Yang and Zhibo Zhang and Min Yang and Yuan Zhang and Haixin Duan}, title = {TextExerciser: Feedback-driven Text Input Exercising for Android Applications}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1071--1087}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00071}, doi = {10.1109/SP40000.2020.00071}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HeZYCLLYZYZD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Dai0JZCXZT0Y20, author = {Jiarun Dai and Yuan Zhang and Zheyue Jiang and Yingtian Zhou and Junyan Chen and Xinyu Xing and Xiaohan Zhang and Xin Tan and Min Yang and Zhemin Yang}, editor = {Srdjan Capkun and Franziska Roesner}, title = {BScout: Direct Whole Patch Presence Test for Java Executables}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1147--1164}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/dai}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/Dai0JZCXZT0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhouYXCY020, author = {Shunfan Zhou and Zhemin Yang and Jie Xiang and Yinzhi Cao and Min Yang and Yuan Zhang}, editor = {Srdjan Capkun and Franziska Roesner}, title = {An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2793--2810}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhou-shunfan}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhouYXCY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/ZhangYHLY00Q19, author = {Lei Zhang and Zhemin Yang and Yuyu He and Mingqi Li and Sen Yang and Min Yang and Yuan Zhang and Zhiyun Qian}, title = {App in the Middle: Demystify Application Virtualization in Android and its Security Threats}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {3}, number = {1}, pages = {17:1--17:24}, year = {2019}, url = {https://doi.org/10.1145/3322205.3311088}, doi = {10.1145/3322205.3311088}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/ZhangYHLY00Q19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/ZhangYHLYYZQ19, author = {Lei Zhang and Zhemin Yang and Yuyu He and Mingqi Li and Sen Yang and Min Yang and Yuan Zhang and Zhiyun Qian}, editor = {Erich M. Nahum and Thomas Bonald and Nick Duffield}, title = {App in the Middle: Demystify Application Virtualization in Android and its Security Threats}, booktitle = {Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, Phoenix, AZ, USA, June 24-28, 2019}, pages = {75--76}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309697.3331517}, doi = {10.1145/3309697.3331517}, timestamp = {Sun, 01 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/ZhangYHLYYZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYHZQHZY18, author = {Lei Zhang and Zhemin Yang and Yuyu He and Zhenyu Zhang and Zhiyun Qian and Geng Hong and Yuan Zhang and Min Yang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Invetter: Locating Insecure Input Validations in Android Services}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1165--1178}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243843}, doi = {10.1145/3243734.3243843}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYHZQHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HongYYZNZYZQD18, author = {Geng Hong and Zhemin Yang and Sen Yang and Lei Zhang and Yuhong Nan and Zhibo Zhang and Min Yang and Yuan Zhang and Zhiyun Qian and Hai{-}Xin Duan}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {How You Get Shot in the Back: {A} Systematical Study about Cryptojacking in the Real World}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1701--1713}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243840}, doi = {10.1145/3243734.3243840}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HongYYZNZYZQD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NanY0ZZ018, author = {Yuhong Nan and Zhemin Yang and Xiaofeng Wang and Yuan Zhang and Donglai Zhu and Min Yang}, title = {Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05B-1\_Nan\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/NanY0ZZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZMXY00LD18, author = {Xiaohan Zhang and Yuan Zhang and Qianqian Mo and Hao Xia and Zhemin Yang and Min Yang and Xiaofeng Wang and Long Lu and Hai{-}Xin Duan}, editor = {William Enck and Adrienne Porter Felt}, title = {An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1183--1198}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/zhang-xiaohan}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangZMXY00LD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ZhangDZHYY018, author = {Yuan Zhang and Jiarun Dai and Xiaohan Zhang and Sirong Huang and Zhemin Yang and Min Yang and Hao Chen}, editor = {Rocco Oliveto and Massimiliano Di Penta and David C. Shepherd}, title = {Detecting third-party libraries in Android applications with high precision and recall}, booktitle = {25th International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018}, pages = {141--152}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SANER.2018.8330204}, doi = {10.1109/SANER.2018.8330204}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/ZhangDZHYY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-07339, author = {Guofu Li and Pengjia Zhu and Jin Li and Zhemin Yang and Ning Cao and Zhiyi Chen}, title = {Security Matters: {A} Survey on Adversarial Machine Learning}, journal = {CoRR}, volume = {abs/1810.07339}, year = {2018}, url = {http://arxiv.org/abs/1810.07339}, eprinttype = {arXiv}, eprint = {1810.07339}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-07339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/NanYYZZGWS17, author = {Yuhong Nan and Zhemin Yang and Min Yang and Shunfan Zhou and Yuan Zhang and Guofei Gu and Xiaofeng Wang and Limin Sun}, title = {Identifying User-Input Privacy in Mobile Applications at a Large Scale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {647--661}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2631949}, doi = {10.1109/TIFS.2016.2631949}, timestamp = {Sat, 09 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/NanYYZZGWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/ZhangZYSY16, author = {Lei Zhang and Donglai Zhu and Zhemin Yang and Limin Sun and Min Yang}, title = {A survey of privacy protection techniques for mobile devices}, journal = {J. Commun. Inf. Networks}, volume = {1}, number = {4}, pages = {86--92}, year = {2016}, url = {https://doi.org/10.1007/BF03391582}, doi = {10.1007/BF03391582}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcin/ZhangZYSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NanYYZGW15, author = {Yuhong Nan and Min Yang and Zhemin Yang and Shunfan Zhou and Guofei Gu and Xiaofeng Wang}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {UIPicker: User-Input Privacy Identification in Mobile Applications}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {993--1008}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/nan}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NanYYZGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangYYGNZ14, author = {Yuan Zhang and Min Yang and Zhemin Yang and Guofei Gu and Peng Ning and Binyu Zang}, title = {Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {11}, pages = {1828--1842}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2347206}, doi = {10.1109/TIFS.2014.2347206}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangYYGNZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYXYGNWZ13, author = {Yuan Zhang and Min Yang and Bingquan Xu and Zhemin Yang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang and Binyu Zang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Vetting undesirable behaviors in android apps with permission use analysis}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {611--622}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516689}, doi = {10.1145/2508859.2516689}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYXYGNWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangYZGNW13, author = {Zhemin Yang and Min Yang and Yuan Zhang and Guofei Gu and Peng Ning and Xiaoyang Sean Wang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {AppIntent: analyzing sensitive data transmission in android for privacy leakage detection}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1043--1054}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516676}, doi = {10.1145/2508859.2516676}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangYZGNW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/ZhangYZYZZ12, author = {Yuan Zhang and Min Yang and Bo Zhou and Zhemin Yang and Weihua Zhang and Binyu Zang}, editor = {Steven Hand and Dilma Da Silva}, title = {Swift: a register-based {JIT} compiler for embedded JVMs}, booktitle = {Proceedings of the 8th International Conference on Virtual Execution Environments, {VEE} 2012, London, UK, March 3-4, 2012 (co-located with {ASPLOS} 2012)}, pages = {63--74}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2151024.2151035}, doi = {10.1145/2151024.2151035}, timestamp = {Tue, 20 Dec 2022 17:33:09 +0100}, biburl = {https://dblp.org/rec/conf/vee/ZhangYZYZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/YangYXCZ11, author = {Zhemin Yang and Min Yang and Lvcai Xu and Haibo Chen and Binyu Zang}, editor = {Jason Nieh and Carl A. Waldspurger}, title = {{ORDER:} Object centRic DEterministic Replay for Java}, booktitle = {2011 {USENIX} Annual Technical Conference, Portland, OR, USA, June 15-17, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/usenixatc11/order-object-centric-deterministic-replay-java}, timestamp = {Mon, 01 Feb 2021 08:43:25 +0100}, biburl = {https://dblp.org/rec/conf/usenix/YangYXCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.