default search action
Tevfik Bultan
Person information
- affiliation: University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j41]Ismet Burak Kadron, Yannic Noller, Rohan Padhye, Tevfik Bultan, Corina S. Pasareanu, Koushik Sen:
Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing. IEEE Softw. 41(1): 98-104 (2024) - [i7]Laboni Sarker, Mara Downing, Achintya Desai, Tevfik Bultan:
Syntactic Robustness for LLM-based Code Generation. CoRR abs/2404.01535 (2024) - [i6]Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan:
UEFI Vulnerability Signature Generation using Static and Symbolic Analysis. CoRR abs/2407.07166 (2024) - 2023
- [j40]Seemanta Saha, Surendra Ghentiyala, Shihua Lu, Lucas Bang, Tevfik Bultan:
Obtaining Information Leakage Bounds via Approximate Model Counting. Proc. ACM Program. Lang. 7(PLDI): 1488-1509 (2023) - [c117]William Eiers, Ganesh Sankaran, Tevfik Bultan:
Quantitative Policy Repair for Access Control on the Cloud. ISSTA 2023: 564-575 - [c116]Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:
Rare Path Guided Fuzzing. ISSTA 2023: 1295-1306 - [c115]Mara Downing, Tevfik Bultan:
The Case for Scalable Quantitative Neural Network Analysis. SE4SafeML@SIGSOFT FSE 2023: 22-25 - 2022
- [c114]Seemanta Saha, Mara Downing, Tegan Brennan, Tevfik Bultan:
PREACH: A Heuristic for Probabilistic Reachability to Identify Hard to Reach Statements. ICSE 2022: 1706-1717 - [c113]William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quantifying Permissiveness of Access Control Policies. ICSE 2022: 1805-1817 - [c112]Ismet Burak Kadron, Chaofan Shou, Emily O'Mahony, Yilmaz Vural, Tevfik Bultan:
Targeted Black-Box Side-Channel Mitigation for IoT✱. IOT 2022: 49-56 - [c111]William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quacky: Quantitative Access Control Permissiveness Analyzer✱. ASE 2022: 163:1-163:5 - [c110]Ismet Burak Kadron, Tevfik Bultan:
TSA: a tool to detect and quantify network side-channels. ESEC/SIGSOFT FSE 2022: 1760-1764 - [i5]Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan:
Rare-Seed Generation for Fuzzing. CoRR abs/2212.09004 (2022) - 2021
- [c109]Chaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan:
CorbFuzz: Checking Browser Security Policies with Fuzzing. ASE 2021: 215-226 - [i4]Chaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan:
CorbFuzz: Checking Browser Security Policies with Fuzzing. CoRR abs/2109.00398 (2021) - 2020
- [j39]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020) - [c108]Tegan Brennan, Seemanta Saha, Tevfik Bultan:
JVM fuzzing for JIT-induced side-channel detection. ICSE 2020: 1011-1023 - [c107]Ismet Burak Kadron, Nicolás Rosner, Tevfik Bultan:
Feedback-driven side-channel analysis for networked applications. ISSTA 2020: 260-271 - [c106]Tegan Brennan, Nicolás Rosner, Tevfik Bultan:
JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation. SP 2020: 1207-1222
2010 – 2019
- 2019
- [j38]Ivan Bocic, Tevfik Bultan, Nicolás Rosner:
Inductive verification of data model invariants in web applications using first-order logic. Autom. Softw. Eng. 26(2): 379-416 (2019) - [j37]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Attack Synthesis. ACM SIGSOFT Softw. Eng. Notes 44(4): 16 (2019) - [c105]William Eiers, Seemanta Saha, Tegan Brennan, Tevfik Bultan:
Subformula Caching for Model Counting and Quantitative Program Analysis. ASE 2019: 453-464 - [c104]Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Profit: Detecting and Quantifying Side Channels in Networked Applications. NDSS 2019 - [c103]Tevfik Bultan:
Quantifying Information Leakage Using Model Counting Constraint Solvers. VSTTE 2019: 30-35 - [e9]Joanne M. Atlee, Tevfik Bultan, Jon Whittle:
Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019. IEEE / ACM 2019, ISBN 978-1-7281-0869-8 [contents] - [e8]Joanne M. Atlee, Tevfik Bultan, Jon Whittle:
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019. IEEE / ACM 2019, ISBN 978-1-7281-1764-5 [contents] - [i3]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Adaptive Attack Synthesis. CoRR abs/1905.05322 (2019) - [i2]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. CoRR abs/1907.11710 (2019) - 2018
- [j36]Tevfik Bultan:
Side-Channel Analysis via Symbolic Execution and Model Counting. ACM SIGSOFT Softw. Eng. Notes 43(4): 55 (2018) - [j35]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. ACM SIGSOFT Softw. Eng. Notes 43(4): 56 (2018) - [c102]Nestan Tsiskaridze, Lucas Bang, Joseph McMahan, Tevfik Bultan, Timothy Sherwood:
Information Leakage in Arbiter Protocols. ATVA 2018: 404-421 - [c101]Lucas Bang, Nicolás Rosner, Tevfik Bultan:
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. EuroS&P 2018: 307-322 - [c100]Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:
Static detection of API call vulnerabilities in iOS executables. ICSE (Companion Volume) 2018: 394-395 - [c99]Tegan Brennan, Seemanta Saha, Tevfik Bultan:
Symbolic path cost analysis for side-channel detection. ICSE (Companion Volume) 2018: 424-425 - [c98]Tegan Brennan, Seemanta Saha, Tevfik Bultan, Corina S. Pasareanu:
Symbolic path cost analysis for side-channel detection. ISSTA 2018: 27-37 - [c97]Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. ESEC/SIGSOFT FSE 2018: 400-410 - 2017
- [b1]Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin:
String Analysis for Software Verification and Security. Springer 2017, ISBN 978-3-319-68668-4, pp. 1-166 - [j34]Tevfik Bultan, Andreas Zeller:
Guest editorial: emerging areas in automated software engineering research. Autom. Softw. Eng. 24(4): 863-864 (2017) - [c96]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. CSF 2017: 328-342 - [c95]Ivan Bocic, Tevfik Bultan:
Symbolic model extraction for web application verification. ICSE 2017: 724-734 - [c94]Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan:
Constraint normalization and parameterized caching for quantitative program analysis. ESEC/SIGSOFT FSE 2017: 535-546 - [e7]Tevfik Bultan, Koushik Sen:
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017. ACM 2017, ISBN 978-1-4503-5076-1 [contents] - [i1]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 401 (2017) - 2016
- [j33]Samik Basu, Tevfik Bultan:
On deciding synchronizability for asynchronously communicating systems. Theor. Comput. Sci. 656: 60-75 (2016) - [c93]Samik Basu, Tevfik Bultan:
Automated Choreography Repair. FASE 2016: 13-30 - [c92]Tevfik Bultan:
Side Channel Analysis Using a Model Counting Constraint Solver and Symbolic Execution (Invited Talk). FSTTCS 2016: 6:1-6:2 - [c91]Fang Yu, Ching-Yuan Shueh, Chun-Han Lin, Yu-Fang Chen, Bow-Yaw Wang, Tevfik Bultan:
Optimal sanitization synthesis for web application vulnerability repair. ISSTA 2016: 189-200 - [c90]Ivan Bocic, Tevfik Bultan:
Finding access control bugs in web applications with CanCheck. ASE 2016: 155-166 - [c89]Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan:
String analysis for side channels with segmented oracles. SIGSOFT FSE 2016: 193-204 - 2015
- [j32]Jian Lu, David S. Rosenblum, Tevfik Bultan, Valérie Issarny, Schahram Dustdar, Margaret-Anne D. Storey, Dongmei Zhang:
Roundtable: The Future of Software Engineering for Internet Computing. IEEE Softw. 32(1): 91-97 (2015) - [j31]Jaideep Nijjar, Ivan Bocic, Tevfik Bultan:
Data Model Property Inference, Verification, and Repair for Web Applications. ACM Trans. Softw. Eng. Methodol. 24(4): 25:1-25:27 (2015) - [c88]Abdulbaki Aydin, Lucas Bang, Tevfik Bultan:
Automata-Based Model Counting for String Constraints. CAV (1) 2015: 255-272 - [c87]Ivan Bocic, Tevfik Bultan:
Coexecutability for Efficient Verification of Data Model Updates. ICSE (1) 2015: 744-754 - [c86]Ivan Bocic, Tevfik Bultan:
Efficient Data Model Verification with Many-Sorted Logic (T). ASE 2015: 42-52 - [c85]Ivan Bocic, Tevfik Bultan:
Data Model Bugs. NFM 2015: 393-399 - [c84]Lucas Bang, Abdulbaki Aydin, Tevfik Bultan:
Automatically computing path complexity of programs. ESEC/SIGSOFT FSE 2015: 61-72 - [c83]Tevfik Bultan:
String Analysis for Vulnerability Detection and Repair. SPIN 2015: 3-9 - 2014
- [j30]Fang Yu, Muath Alkhalaf, Tevfik Bultan, Oscar H. Ibarra:
Automata-based symbolic string analysis for vulnerability detection. Formal Methods Syst. Des. 44(1): 44-70 (2014) - [c82]Chandra Krintz, Hiranya Jayathilaka, Stratos Dimopoulos, Alexander Pucher, Rich Wolski, Tevfik Bultan:
Cloud Platform Support for API Governance. IC2E 2014: 615-618 - [c81]Ivan Bocic, Tevfik Bultan:
Inductive verification of data model invariants for web applications. ICSE 2014: 620-631 - [c80]Abdulbaki Aydin, Muath Alkhalaf, Tevfik Bultan:
Automated Test Generation from Vulnerability Signatures. ICST 2014: 193-202 - [c79]Muath Alkhalaf, Abdulbaki Aydin, Tevfik Bultan:
Semantic differential repair for input validation and sanitization. ISSTA 2014: 225-236 - [c78]Samik Basu, Tevfik Bultan:
Automatic verification of interactions in asynchronous systems with unbounded buffers. ASE 2014: 743-754 - 2013
- [c77]Meriem Ouederni, Gwen Salaün, Tevfik Bultan:
Compatibility Checking for Asynchronously Communicating Software. FACS 2013: 310-328 - [c76]Tevfik Bultan:
Analyzing Interactions of Asynchronously Communicating Software Components - (Invited Paper). FMOODS/FORTE 2013: 1-4 - [c75]Jaideep Nijjar, Ivan Bocic, Tevfik Bultan:
An integrated data model verifier with property templates. FormaliSE@ICSE 2013: 29-35 - [c74]Jaideep Nijjar, Tevfik Bultan:
Data model property inference and repair. ISSTA 2013: 202-212 - [e6]Ewen Denney, Tevfik Bultan, Andreas Zeller:
2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013. IEEE 2013 [contents] - 2012
- [j29]Gwen Salaün, Tevfik Bultan, Nima Roohi:
Realizability of Choreographies Using Process Algebra Encodings. IEEE Trans. Serv. Comput. 5(3): 290-304 (2012) - [c73]Muath Alkhalaf, Tevfik Bultan, Jose L. Gallegos:
Verifying client-side input validation functions using string analysis. ICSE 2012: 947-957 - [c72]Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazzini, Tevfik Bultan, Alessandro Orso, Christopher Kruegel:
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies. ISSTA 2012: 56-66 - [c71]Jaideep Nijjar, Tevfik Bultan:
Unbounded data model verification using SMT solvers. ASE 2012: 210-219 - [c70]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Deciding choreography realizability. POPL 2012: 191-202 - [c69]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Synchronizability for Verification of Asynchronously Communicating Systems. VMCAI 2012: 56-71 - [e5]Will Tracz, Martin P. Robillard, Tevfik Bultan:
20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT/FSE'12, Cary, NC, USA - November 11 - 16, 2012. ACM 2012, ISBN 978-1-4503-1614-9 [contents] - 2011
- [j28]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-Track Automata. Int. J. Found. Comput. Sci. 22(8): 1909-1924 (2011) - [c68]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Patching vulnerabilities with sanitization synthesis. ICSE 2011: 251-260 - [c67]Jaideep Nijjar, Tevfik Bultan:
Bounded verification of Ruby on Rails data models. ISSTA 2011: 67-77 - [c66]Fang Yu, Tevfik Bultan, Ben Hardekopf:
String Abstractions for String Verification. SPIN 2011: 20-37 - [c65]Samik Basu, Tevfik Bultan:
Choreography conformance via synchronizability. WWW 2011: 795-804 - [e4]Tevfik Bultan, Pao-Ann Hsiung:
Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings. Lecture Notes in Computer Science 6996, Springer 2011, ISBN 978-3-642-24371-4 [contents] - [e3]Mario Bravetti, Tevfik Bultan:
Web Services and Formal Methods - 7th International Workshop, WS-FM 2010, Hoboken, NJ, USA, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6551, Springer 2011, ISBN 978-3-642-19588-4 [contents] - 2010
- [j27]Sylvain Hallé, Tevfik Bultan, Graham Hughes, Muath Alkhalaf, Roger Villemaire:
Runtime Verification of Web Service Interface Contracts. Computer 43(3): 59-66 (2010) - [c64]Sylvain Hallé, Taylor Ettema, Chris Bunch, Tevfik Bultan:
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. ASE 2010: 235-244 - [c63]Tevfik Bultan, Fang Yu, Aysu Betin-Can:
Modular verification of synchronization with reentrant locks. MEMOCODE 2010: 59-68 - [c62]Sylvain Hallé, Tevfik Bultan:
Realizability analysis for message-based interactions using shared-state projections. SIGSOFT FSE 2010: 27-36 - [c61]Tevfik Bultan:
Software for everyone by everyone. FoSER 2010: 69-74 - [c60]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Stranger: An Automata-Based String Analysis Tool for PHP. TACAS 2010: 154-157 - [c59]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-track Automata. CIAA 2010: 290-299 - [c58]Ben Rubinger, Tevfik Bultan:
Contracting the Facebook API. TAV-WEB 2010: 63-74
2000 – 2009
- 2009
- [j26]Tuba Yavuz-Kahveci, Tevfik Bultan:
Action Language verifier: an infinite-state model checker for reactive software specifications. Formal Methods Syst. Des. 35(3): 325-367 (2009) - [c57]Sylvain Hallé, Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Generating Interface Grammars from WSDL for Automated Verification of Web Services. ICSOC/ServiceWave 2009: 516-530 - [c56]Tevfik Bultan, Chris Ferguson, Xiang Fu:
A Tool for Choreography Analysis Using Collaboration Diagrams. ICWS 2009: 856-863 - [c55]Gwen Salaün, Tevfik Bultan:
Realizability of Choreographies Using Process Algebra Encodings. IFM 2009: 167-182 - [c54]Zachary Stengel, Tevfik Bultan:
Analyzing singularity channel contracts. ISSTA 2009: 13-24 - [c53]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. ASE 2009: 605-609 - [c52]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336 - 2008
- [j25]Tevfik Bultan, Constance L. Heitmeyer:
Applying infinite state model checking and other analysis techniques to tabular requirements specifications of safety-critical systems. Des. Autom. Embed. Syst. 12(1-2): 97-137 (2008) - [j24]Tevfik Bultan, Xiang Fu:
Choreography Modeling and Analysis with Collaboration Diagrams. IEEE Data Eng. Bull. 31(3): 27-30 (2008) - [j23]Tevfik Bultan, Xiang Fu:
Specification of realizable service conversations using collaboration diagrams. Serv. Oriented Comput. Appl. 2(1): 27-39 (2008) - [j22]Graham Hughes, Tevfik Bultan:
Automated verification of access control policies using a SAT solver. Int. J. Softw. Tools Technol. Transf. 10(6): 503-520 (2008) - [j21]Graham Hughes, Tevfik Bultan:
Interface Grammars for Modular Software Model Checking. IEEE Trans. Software Eng. 34(5): 614-632 (2008) - [c51]Tevfik Bultan:
Service Choreography and Orchestration with Conversations. CONCUR 2008: 2-3 - [c50]Graham Hughes, Tevfik Bultan, Muath Alkhalaf:
Client and server verification for web services using interface grammars. TAV-WEB 2008: 40-46 - [c49]Tevfik Bultan, Tao Xie:
Workshop on testing, analysis and verification of web software (TAV-WEB 2008). ISSTA 2008: 311-312 - [c48]Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan:
Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202 - [c47]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra:
Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324 - [e2]Tevfik Bultan, Tao Xie:
Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), TAV-WEB 2008, Seattle, Washington, USA, July 21, 2008. ACM 2008, ISBN 978-1-60558-053-1 [contents] - 2007
- [j20]Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Eliminating synchronization faults in air traffic control software via design for verification with concurrency controllers. Autom. Softw. Eng. 14(2): 129-178 (2007) - [j19]Mikael Lindvall, Ioana Rus, Paolo Donzelli, Atif M. Memon, Marvin V. Zelkowitz, Aysu Betin-Can, Tevfik Bultan, Christopher Ackermann, Bettina Anders, Sima Asgari, Victor R. Basili, Lorin Hochstein, Jörg Fellmann, Forrest Shull, Roseanne Tesoriero Tvedt, Daniel Pech, Daniel Hirschbach:
Experimenting with software testbeds for evaluating new technologies. Empir. Softw. Eng. 12(4): 417-444 (2007) - [j18]Aysu Betin-Can, Tevfik Bultan:
Highly dependable concurrent programming using design for verification. Formal Aspects Comput. 19(2): 243-268 (2007) - [c46]Graham Hughes, Tevfik Bultan:
Interface grammars for modular software model checking. ISSTA 2007: 39-49 - [c45]Elliot Barlas, Tevfik Bultan:
Netstub: a framework for verification of distributed java applications. ASE 2007: 24-33 - [c44]Fang Yu, Tevfik Bultan, Erik Peterson:
Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340 - [c43]Tevfik Bultan, Xiang Fu:
Specification of Realizable Service Conversations Using Collaboration Diagrams. SOCA 2007: 122-132 - [c42]Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zhao:
Towards a Theory of Web Service Choreographies. WS-FM 2007: 1-16 - [p1]