default search action
Tuba Yavuz
Person information
- affiliation: University of Florida, Gainesville, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Ruochen Dai, Zhaoxiang Liu, Orlando Arias, Xiaolong Guo, Tuba Yavuz:
DTjRTL: A Configurable Framework for Automated Hardware Trojan Insertion at RTL. ACM Great Lakes Symposium on VLSI 2024: 465-470 - [c25]Ruochen Dai, Tuba Yavuz:
Detecting Hardware Trojans using Model Guided Symbolic Execution. ACM Great Lakes Symposium on VLSI 2024: 569-573 - [i8]Tuba Yavuz, Chin Khor, Ken Yihang Bai, Robyn R. Lutz:
Generating Maximal Configurations and Their Variants Using Code Metrics. CoRR abs/2401.07898 (2024) - [i7]Tuba Yavuz:
Multi-Pass Targeted Dynamic Symbolic Execution. CoRR abs/2408.07797 (2024) - 2023
- [j10]Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. IEEE Trans. Dependable Secur. Comput. 20(2): 1577-1595 (2023) - [j9]Ruochen Dai, Tuba Yavuz:
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions. ACM Trans. Design Autom. Electr. Syst. 28(2): 28:1-28:31 (2023) - [c24]Ken Yihang Bai, Tuba Yavuz:
MMIO Access-Based Coverage for Firmware Analysis. CNS 2023: 1-9 - [i6]Ruochen Dai, Michael Lee, Patrick Hoey, Weimin Fu, Tuba Yavuz, Xiaolong Guo, Shuo Wang, Dean Sullivan, Orlando Arias:
VGF: Value-Guided Fuzzing - Fuzzing Hardware as Hardware. CoRR abs/2312.06580 (2023) - 2022
- [c23]Christopher Brant, Tuba Yavuz:
A Study on the Testing of Android Security Patches. CNS 2022: 217-225 - [c22]Tuba Yavuz, Christopher Brant:
Security Analysis of IoT Frameworks using Static Taint Analysis. CODASPY 2022: 203-213 - [c21]Weimin Fu, Honggang Yu, Orlando Arias, Kaichen Yang, Yier Jin, Tuba Yavuz, Xiaolong Guo:
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms. ACM Great Lakes Symposium on VLSI 2022: 481-486 - [c20]Tuba Yavuz:
SIFT: A Tool for Property Directed Symbolic Execution of Multithreaded Software. ICST 2022: 433-443 - 2021
- [j8]Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin R. B. Butler, Tuba Yavuz:
ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Trans. Software Eng. 47(9): 1907-1928 (2021) - [c19]Farhaan Fowze, Tuba Yavuz:
SEESAW: a tool for detecting memory vulnerabilities in protocol stack implementations. MEMOCODE 2021: 126-133 - [c18]Farhaan Fowze, Tuba Yavuz:
Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis. NSysS 2021: 29-39 - [i5]Seyedehzahra Khoshmanesh, Tuba Yavuz, Robyn R. Lutz:
Learning Feature Interactions With and Without Specifications. CoRR abs/2104.07844 (2021) - [i4]Ruochen Dai, Tuba Yavuz:
A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions. CoRR abs/2111.03989 (2021) - 2020
- [j7]Tuba Yavuz, Ken Yihang Bai:
Analyzing system software components using API model guided symbolic execution. Autom. Softw. Eng. 27(3): 329-367 (2020) - [j6]Tuba Yavuz:
Partial predicate abstraction and counter-example guided refinement. J. Log. Algebraic Methods Program. 110 (2020) - [c17]Tuba Yavuz:
Verifying Absence of Hardware-Software Data Races using Counting Abstraction. MEMOCODE 2020: 1-6 - [c16]Tuba Yavuz, Ken Yihang Bai:
Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT. SecDev 2020: 2-3
2010 – 2019
- 2019
- [j5]Grant Hernandez, Farhaan Fowze, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [c15]Tuba Yavuz:
Detecting Callback Related Deep Vulnerabilities in Linux Device Drivers. SecDev 2019: 62-75 - 2018
- [j4]Chelsea A. Metcalf, Tuba Yavuz:
Detecting potential deadlocks through change impact analysis. Softw. Qual. J. 26(3): 1015-1036 (2018) - [i3]Tuba Yavuz, Chelsea A. Metcalf:
Heuristics for Selecting Predicates for Partial Predicate Abstraction. CoRR abs/1801.02457 (2018) - 2017
- [c14]Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CCS 2017: 2245-2262 - [i2]Grant Hernandez, Farhaan Fowze, Dave Tian, Tuba Yavuz, Kevin R. B. Butler:
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution. CoRR abs/1708.09114 (2017) - [i1]Tuba Yavuz:
Partial Predicate Abstraction and Counter-Example Guided Refinement. CoRR abs/1712.01734 (2017) - 2016
- [c13]Chelsea A. Metcalf, Farhaan Fowze, Tuba Yavuz, José Fortes:
Extracting configuration parameter interactions using static analysis. ICPC 2016: 1-4 - [c12]Farhaan Fowze, Tuba Yavuz:
Specification, verification, and synthesis using extended state machines with callbacks. MEMOCODE 2016: 95-104 - [c11]Tuba Yavuz:
Combining Predicate Abstraction with Fixpoint Approximations. SEFM 2016: 104-120 - 2012
- [j3]KyungHee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders:
JRF-E: using model checking to give advice on eliminating memory model-related bugs. Autom. Softw. Eng. 19(4): 491-530 (2012) - [c10]Huafeng Jin, Tuba Yavuz-Kahveci, Beverly A. Sanders:
Java Memory Model-Aware Model Checking. TACAS 2012: 220-236 - 2010
- [c9]KyungHee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders:
JRF-E: using model checking to give advice on eliminating memory model-related bugs. ASE 2010: 215-224
2000 – 2009
- 2009
- [j2]Tuba Yavuz-Kahveci, Tevfik Bultan:
Action Language verifier: an infinite-state model checker for reactive software specifications. Formal Methods Syst. Des. 35(3): 325-367 (2009) - [c8]KyungHee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders:
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking. ASE 2009: 495-499 - 2005
- [c7]Tuba Yavuz-Kahveci, Constantinos Bartzis, Tevfik Bultan:
Action Language Verifier, Extended. CAV 2005: 413-417 - [c6]Tuba Yavuz-Kahveci, Tevfik Bultan:
Verification of parameterized hierarchical state machines using action language verifier. MEMOCODE 2005: 79-88 - 2003
- [j1]Tuba Yavuz-Kahveci, Tevfik Bultan:
A symbolic manipulator for automated verification of reactive systems with heterogeneous data types. Int. J. Softw. Tools Technol. Transf. 5(1): 15-33 (2003) - 2002
- [c5]Tuba Yavuz-Kahveci, Tevfik Bultan:
Heuristics for Efficient Manipulation of Composite Constraints. FroCoS 2002: 57-71 - [c4]Tuba Yavuz-Kahveci, Tevfik Bultan:
Specification, verification, and synthesis of concurrency control components. ISSTA 2002: 169-179 - [c3]Tuba Yavuz-Kahveci, Tevfik Bultan:
Automated Verification of Concurrent Linked Lists with Counters. SAS 2002: 69-84 - 2001
- [c2]Tevfik Bultan, Tuba Yavuz-Kahveci:
Action Language Verifier. ASE 2001: 382-386 - [c1]Tuba Yavuz-Kahveci, Murat Tuncer, Tevfik Bultan:
A Library for Composite Symbolic Representations. TACAS 2001: 52-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint