default search action
Petar Tsankov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c30]Igor Linkov, Kelsey Stoddard, Andrew Strelzoff, Stephanie Elisabeth Galaitsi, Jeffrey M. Keisler, Benjamin D. Trump, Alexander Kott, Pavol Bielik, Petar Tsankov:
Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI. CyCon 2023: 181-197 - 2021
- [c29]Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin T. Vechev:
Learning to Explore Paths for Symbolic Execution. CCS 2021: 2526-2540 - [c28]Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel:
Robustness Testing of AI Systems: A Case Study for Traffic Sign Recognition. AIAI 2021: 256-267 - [c27]Chengyuan Yao, Pavol Bielik, Petar Tsankov, Martin T. Vechev:
Automated Discovery of Adaptive Attacks on Adversarial Defenses. NeurIPS 2021: 26858-26870 - [c26]Rüdiger Birkner, Tobias Brodmann, Petar Tsankov, Laurent Vanbever, Martin T. Vechev:
Metha: Network Verifiers Need To Be Correct Too! NSDI 2021: 99-113 - [i6]Chengyuan Yao, Pavol Bielik, Petar Tsankov, Martin T. Vechev:
Automated Discovery of Adaptive Attacks on Adversarial Defenses. CoRR abs/2102.11860 (2021) - [i5]Christian Berghoff, Pavol Bielik, Matthias Neu, Petar Tsankov, Arndt von Twickel:
Robustness testing of AI systems: A case study for traffic sign recognition. CoRR abs/2108.06159 (2021) - 2020
- [c25]Samuel Steffen, Timon Gehr, Petar Tsankov, Laurent Vanbever, Martin T. Vechev:
Probabilistic Verification of Network Configurations. SIGCOMM 2020: 750-764 - [c24]Anton Permenev, Dimitar K. Dimitrov, Petar Tsankov, Dana Drachsler-Cohen, Martin T. Vechev:
VerX: Safety Verification of Smart Contracts. SP 2020: 1661-1677 - [i4]Nick Baumann, Samuel Steffen, Benjamin Bichsel, Petar Tsankov, Martin T. Vechev:
zkay v0.2: Practical Data Privacy for Smart Contracts. CoRR abs/2009.01020 (2020)
2010 – 2019
- 2019
- [c23]Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin T. Vechev:
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts. CCS 2019: 531-548 - [c22]Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin T. Vechev:
zkay: Specifying and Enforcing Data Privacy in Smart Contracts. CCS 2019: 1759-1776 - 2018
- [c21]Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev:
Securify: Practical Security Analysis of Smart Contracts. CCS 2018: 67-82 - [c20]Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev:
DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. CCS 2018: 508-524 - [c19]Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin T. Vechev:
Debin: Predicting Debug Information in Stripped Binaries. CCS 2018: 1667-1680 - [c18]Petar Tsankov:
Security Analysis of Smart Contracts in Datalog. ISoLA (4) 2018: 316-322 - [c17]Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, Martin T. Vechev:
NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. NSDI 2018: 579-594 - [c16]Rumen Paletov, Petar Tsankov, Veselin Raychev, Martin T. Vechev:
Inferring crypto API rules from code changes. PLDI 2018: 450-464 - [c15]Timon Gehr, Sasa Misailovic, Petar Tsankov, Laurent Vanbever, Pascal Wiesmann, Martin T. Vechev:
Bayonet: probabilistic inference for networks. PLDI 2018: 586-602 - [c14]Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev:
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation. IEEE Symposium on Security and Privacy 2018: 3-18 - [c13]Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, Martin T. Vechev:
NetHide: Secure and Practical Network Topology Obfuscation. USENIX Security Symposium 2018: 693-709 - [i3]Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Buenzli, Martin T. Vechev:
Securify: Practical Security Analysis of Smart Contracts. CoRR abs/1806.01143 (2018) - 2017
- [j1]Karl Wüst, Petar Tsankov, Sasa Radomirovic, Mohammad Torabi Dashti:
Force Open: Lightweight black box file repair. Digit. Investig. 20 Supplement: S75-S82 (2017) - [c12]Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, Martin T. Vechev:
Network-Wide Configuration Synthesis. CAV (2) 2017: 261-281 - [c11]Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin T. Vechev:
Synthesis of Probabilistic Privacy Enforcement. CCS 2017: 391-408 - [c10]Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin:
Test execution checkpointing for web applications. ISSTA 2017: 203-214 - 2016
- [b1]Petar Tsankov:
Access Control with Formal Security Guarantees. ETH Zurich, Zürich, Switzerland, 2016 - [c9]Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara:
FASE: functionality-aware security enforcement. ACSAC 2016: 471-483 - [c8]Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev:
Statistical Deobfuscation of Android Applications. CCS 2016: 343-355 - [c7]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CSF 2016: 443-457 - [i2]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CoRR abs/1605.01769 (2016) - [i1]Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, Martin T. Vechev:
Network-wide Configuration Synthesis. CoRR abs/1611.02537 (2016) - 2014
- [c6]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Fail-Secure Access Control. CCS 2014: 1157-1168 - [c5]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Decentralized Composite Access Control. POST 2014: 245-264 - 2013
- [c4]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Semi-valid input coverage for fuzz testing. ISSTA 2013: 56-66 - 2012
- [c3]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
SECFUZZ: Fuzz-testing security protocols. AST 2012: 1-7 - 2011
- [c2]Petar Tsankov, Wei Jin, Alessandro Orso, Saurabh Sinha:
Execution Hijacking: Improving Dynamic Analysis by Flying off Course. ICST 2011: 200-209 - [c1]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Constructing Mid-Points for Two-Party Asynchronous Protocols. OPODIS 2011: 481-496
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint