Follow
Fang Yu
Fang Yu
Associate Professor, Dept. Management Information Systems, National Chengchi University
Verified email at nccu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Securing web application code by static analysis and runtime protection
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
Proceedings of the 13th international conference on World Wide Web, 40-52, 2004
8632004
Stranger: An automata-based string analysis tool for PHP
F Yu, M Alkhalaf, T Bultan
International Conference on Tools and Algorithms for the Construction and …, 2010
1732010
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
1222013
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
International SPIN Workshop on Model Checking of Software, 306-324, 2008
1052008
Topological pattern discovery and feature extraction for fraudulent financial reporting
SY Huang, RH Tsaih, F Yu
Expert Systems with Applications 41 (9), 4360-4372, 2014
852014
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 7,779,399, 2010
842010
Verifying web applications using bounded model checking
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
International Conference on Dependable Systems and Networks, 2004, 199-208, 2004
842004
Symbolic string verification: Combining string analysis and size analysis
F Yu, T Bultan, OH Ibarra
International Conference on Tools and Algorithms for the Construction and …, 2009
762009
Automata-based symbolic string analysis for vulnerability detection
F Yu, M Alkhalaf, T Bultan, OH Ibarra
Formal Methods in System Design 44 (1), 44-70, 2014
752014
Patching vulnerabilities with sanitization synthesis
F Yu, M Alkhalaf, T Bultan
Proceedings of the 33rd International Conference on Software Engineering …, 2011
692011
Relational string verification using multi-track automata
F Yu, T Bultan, OH Ibarra
International Journal of Foundations of Computer Science 22 (08), 1909-1924, 2011
642011
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
F Yu, M Alkhalaf, T Bultan
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
562009
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
532013
TCTL inevitability analysis of dense-time systems: From theory to engineering
F Wang, GD Huang, F Yu
IEEE Transactions on Software Engineering 32 (7), 510-526, 2006
46*2006
String Analysis via Automata Manipulation with Logic Circuit Representation
HE Wang, TL Tsai, CH Lin, F Yu, JHR Jiang
International Conference on Computer Aided Verification, 241-260, 2016
362016
String Analysis for Software Verification and Security
T Bultan, F Yu, M Alkhalaf, A Aydin
Springer 10, 978-3, 2017
322017
On spiking neural P systems and partially blind counter machines
OH Ibarra, S Woodworth, F Yu, A Păun
International Conference on Unconventional Computation, 113-129, 2006
322006
String abstractions for string verification
F Yu, T Bultan, B Hardekopf
International SPIN Workshop on Model Checking of Software, 20-37, 2011
312011
Parameterized model counting for string and numeric constraints
A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
282018
Securing KVM-based cloud systems via virtualization introspection
SW Lee, F Yu
2014 47th Hawaii International Conference on System Sciences, 5028-5037, 2014
262014
The system can't perform the operation now. Try again later.
Articles 1–20