default search action
Domagoj Babic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j5]Wontae Choi, Jayanthkumar Kannan, Domagoj Babic:
A scalable, flow-and-context-sensitive taint analysis of android applications. J. Comput. Lang. 51: 1-14 (2019) - [c18]Domagoj Babic, Stefan Bucur, Yaohui Chen, Franjo Ivancic, Tim King, Markus Kusano, Caroline Lemieux, László Szekeres, Wei Wang:
FUDGE: fuzz driver generation at scale. ESEC/SIGSOFT FSE 2019: 975-985 - 2017
- [c17]Domagoj Babic:
SunDew: systematic automated security testing (keynote). SPIN 2017: 10 - 2013
- [j4]Domagoj Babic, Byron Cook, Alan J. Hu, Zvonimir Rakamaric:
Proving termination of nonlinear command sequences. Formal Aspects Comput. 25(3): 389-403 (2013) - [c16]Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer:
Extraction of statistically significant malware behaviors. ACSAC 2013: 69-78 - [c15]Domagoj Babic, Zvonimir Rakamaric:
Asynchronously Communicating Visibly Pushdown Systems. FMOODS/FORTE 2013: 225-241 - [c14]Matko Botincan, Domagoj Babic:
Sigma*: symbolic learning of input-output specifications. POPL 2013: 443-456 - 2012
- [j3]Domagoj Babic, Daniel Reynaud, Dawn Song:
Recognizing malicious software behaviors with tree automata inference. Formal Methods Syst. Des. 41(1): 107-128 (2012) - 2011
- [c13]Domagoj Babic, Daniel Reynaud, Dawn Song:
Malware Analysis with Tree Automata Inference. CAV 2011: 116-131 - [c12]Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, Dawn Song:
Statically-directed dynamic automated test generation. ISSTA 2011: 12-22 - [c11]Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu, Dawn Song:
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery. USENIX Security Symposium 2011 - 2010
- [c10]Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song:
Input generation via decomposition and re-stitching: finding bugs in Malware. CCS 2010: 413-425 - [c9]Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shin, Dawn Song:
Inference and analysis of formal models of botnet command and control protocols. CCS 2010: 426-439
2000 – 2009
- 2009
- [j2]Domagoj Babic, Alan J. Hu:
Approximating the safely reusable set of learned facts. Int. J. Softw. Tools Technol. Transf. 11(4): 325-338 (2009) - 2008
- [c8]Domagoj Babic, Alan J. Hu:
Calysto: scalable and precise extended static checking. ICSE 2008: 211-220 - 2007
- [c7]Domagoj Babic, Alan J. Hu:
Structural Abstraction of Software Verification Conditions. CAV 2007: 366-378 - [c6]Frank Hutter, Domagoj Babic, Holger H. Hoos, Alan J. Hu:
Boosting Verification by Automatic Tuning of Decision Procedures. FMCAD 2007: 27-34 - [c5]Domagoj Babic, Alan J. Hu:
Exploiting Shared Structure in Software Verification Conditions. Haifa Verification Conference 2007: 169-184 - [c4]Domagoj Babic, Alan J. Hu, Zvonimir Rakamaric, Byron Cook:
Proving Termination by Divergence. SEFM 2007: 93-102 - 2006
- [j1]Domagoj Babic, Jesse D. Bingham, Alan J. Hu:
B-Cubing: New Possibilities for Efficient SAT-Solving. IEEE Trans. Computers 55(11): 1315-1324 (2006) - 2005
- [c3]Domagoj Babic, Alan J. Hu:
Integration of supercubing and learning in a SAT solver. ASP-DAC 2005: 438-444 - [c2]Domagoj Babic, Jesse D. Bingham, Alan J. Hu:
Efficient SAT solving: beyond supercubes. DAC 2005: 744-749 - [c1]Domagoj Babic, Jesse D. Bingham, Alan J. Hu:
B-cubing theory: new possibilities for efficient SAT-solving. HLDVT 2005: 192-199
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint