Follow
Edward J. Schwartz
Edward J. Schwartz
Verified email at cmu.edu - Homepage
Title
Cited by
Cited by
Year
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
EJ Schwartz, T Avgerinos, D Brumley
2010 IEEE Symposium on Security and Privacy, 317-331, 2010
11342010
BAP: A binary analysis platform
D Brumley, I Jager, T Avgerinos, E Schwartz
Computer Aided Verification, 463-469, 2011
6952011
The art, science, and engineering of fuzzing: A survey
VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
IEEE Transactions on Software Engineering 47 (11), 2312-2331, 2019
6222019
Automatic exploit generation
T Avgerinos, SK Cha, A Rebert, EJ Schwartz, M Woo, D Brumley
Communications of the ACM 57 (2), 74-84, 2014
6162014
Q: Exploit Hardening Made Easy
EJ Schwartz, T Avgerinos, D Brumley
Usenix Security, 2011
3722011
Native x86 decompilation using semantics-preserving structural analysis and iterative control-flow structuring
EJ Schwartz, J Lee, M Woo, D Brumley
Proceedings of the USENIX Security Symposium, 16, 2013
200*2013
Dire: A neural approach to decompiled identifier naming
J Lacomis, P Yin, E Schwartz, M Allamanis, C Le Goues, G Neubig, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
1352019
Meaningful variable names for decompiled code: a machine translation approach
A Jaffe, J Lacomis, EJ Schwartz, CL Goues, B Vasilescu
Proceedings of the 26th Conference on Program Comprehension, 20-30, 2018
692018
A browser extension for providing visually impaired users access to the content of bar charts on the web
S Elzer, E Schwartz, S Carberry, D Chester, S Demir, P Wu
Proc. of WEBIST, 2007
582007
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables
EJ Schwartz, CF Cohen, M Duggan, J Gennari, JS Havrilla, C Hines
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
552018
Augmenting Decompiler Output with Learned Variable Names and Types
Q Chen, J Lacomis, EJ Schwartz, C Le Goues, G Neubig, B Vasilescu
31st USENIX Security Symposium (USENIX Security 22), 4327-4343, 2022
522022
Varclr: Variable semantic representation pre-training via contrastive learning
Q Chen, J Lacomis, EJ Schwartz, G Neubig, B Vasilescu, C Le Goues
2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE …, 2022
382022
Interactive SIGHT into information graphics
S Demir, D Oliver, E Schwartz, S Elzer, S Carberry, KF McCoy
Proceedings of the 2010 International Cross Disciplinary Conference on Web …, 2010
382010
A Contractual Anonymity System
EJ Schwartz, D Brumley, JM McCune
Network and Distributed System Security Syposium, 2010
36*2010
The art, science, and engineering of fuzzing: A survey
VJM Manès, HS Han, C Han, SK Cha, M Egele, EJ Schwartz, M Woo
arXiv preprint arXiv:1812.00140, 2018
312018
Access to multimodal articles for individuals with sight impairments
S Carberry, S Elzer Schwartz, K Mccoy, S Demir, P Wu, C Greenbacker, ...
ACM Transactions on Interactive Intelligent Systems (TiiS) 2 (4), 1-49, 2013
292013
Interactive SIGHT: textual access to simple bar charts
S Demir, D Oliver, E Schwartz, S Elzer, S Carberry, KF Mccoy, D Chester
New Review of Hypermedia and Multimedia 16 (3), 245-279, 2010
282010
Study of proposed internet congestion control algorithms
K Mills, J Filliben, D Cho, E Schwartz, D Genin
NIST Special Publication 500 (282), 534, 2010
23*2010
Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?
RL Nord, I Ozkaya, EJ Schwartz, F Shull, R Kazman
9th Workshop on Cyber Security Experimentation and Test (CSET 16), 2016
202016
Accessible bar charts for visually impaired users
S Elzer, E Schwartz, S Carberry, D Chester, S Demir, P Wu
Fourth Annual IASTED Intl. Conf. on Telehealth and Assistive Technologies, 55-60, 2008
192008
The system can't perform the operation now. Try again later.
Articles 1–20