Last Days of Academy
Visualizing Symbolic Execution with Bokeh
Certified Reasoning for Automated Verification
DIDAR: Database Intrusion Detection with Automated Recovery
Verified Subtyping with Traits and Mixins
Developer-focused Software Security
Specifying compatible sharing in data structures
Secure Software Development
Exploiting undefined behaviors for efficient symbolic execution