Follow
Fang Yu
Fang Yu
Associate Professor, Dept. Management Information Systems, National Chengchi University
Verified email at nccu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Securing web application code by static analysis and runtime protection
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
Proceedings of the 13th international conference on World Wide Web, 40-52, 2004
9032004
Stranger: An automata-based string analysis tool for PHP
F Yu, M Alkhalaf, T Bultan
International Conference on Tools and Algorithms for the Construction and …, 2010
1832010
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
1282013
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
Model Checking Software: 15th International SPIN Workshop, Los Angeles, CA …, 2008
1102008
Topological pattern discovery and feature extraction for fraudulent financial reporting
SY Huang, RH Tsaih, F Yu
Expert Systems with Applications 41 (9), 4360-4372, 2014
902014
Verifying web applications using bounded model checking
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
International Conference on Dependable Systems and Networks, 2004, 199-208, 2004
882004
Automata-based symbolic string analysis for vulnerability detection
F Yu, M Alkhalaf, T Bultan, OH Ibarra
Formal Methods in System Design 44, 44-70, 2014
862014
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 7,779,399, 2010
852010
Symbolic string verification: Combining string analysis and size analysis
F Yu, T Bultan, OH Ibarra
Tools and Algorithms for the Construction and Analysis of Systems: 15th …, 2009
772009
Relational string verification using multi-track automata
F Yu, T Bultan, OH Ibarra
International Journal of Foundations of Computer Science 22 (08), 1909-1924, 2011
742011
Patching vulnerabilities with sanitization synthesis
F Yu, M Alkhalaf, T Bultan
Proceedings of the 33rd International Conference on Software Engineering …, 2011
712011
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
F Yu, M Alkhalaf, T Bultan
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
612009
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
582013
String analysis via automata manipulation with logic circuit representation
HE Wang, TL Tsai, CH Lin, F Yu, JHR Jiang
Computer Aided Verification: 28th International Conference, CAV 2016 …, 2016
462016
TCTL inevitability analysis of dense-time systems: From theory to engineering
F Wang, GD Huang, F Yu
IEEE Transactions on Software Engineering 32 (7), 510-526, 2006
45*2006
String Analysis for Software Verification and Security
T Bultan, F Yu, M Alkhalaf, A Aydin
Springer 10, 978-3, 2017
392017
Parameterized model counting for string and numeric constraints
A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
332018
String abstractions for string verification
F Yu, T Bultan, B Hardekopf
International SPIN Workshop on Model Checking of Software, 20-37, 2011
322011
On spiking neural P systems and partially blind counter machines
OH Ibarra, S Woodworth, F Yu, A Păun
Unconventional Computation: 5th International Conference, UC 2006, York, UK …, 2006
322006
Securing KVM-based cloud systems via virtualization introspection
SW Lee, F Yu
2014 47th Hawaii International Conference on System Sciences, 5028-5037, 2014
262014
The system can't perform the operation now. Try again later.
Articles 1–20