Follow
Shengjian (Daniel) Guo
Shengjian (Daniel) Guo
Applied Scientist, AWS Proactive Security
Verified email at amazon.com - Homepage
Title
Cited by
Cited by
Year
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
network and distributed systems security symposium, 2019
1462019
SAVIOR: Towards Bug-Driven Hybrid Testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
arXiv preprint arXiv:1906.07327, 2019
922019
Eliminating timing side-channel leaks using program repair
M Wu, S Guo, P Schaumont, C Wang
Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018
892018
Assertion guided symbolic execution of multithreaded programs
S Guo, M Kusano, C Wang, Z Yang, A Gupta
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
662015
MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
arXiv preprint arXiv:2007.15943, 2020
482020
Conc-iSE: Incremental symbolic execution of concurrent software
S Guo, M Kusano, C Wang
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
462016
Adversarial symbolic execution for detecting concurrency-related cache timing leaks
S Guo, M Wu, C Wang
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
332018
SpecuSym: Speculative symbolic execution for cache timing leak detection
S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu, Z Zuo
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
322020
Symbolic execution of programmable logic controller code
S Guo, M Wu, C Wang
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
312017
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
312017
Postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015
302015
Challenging machine learning-based clone detectors via semantic-preserving code transformations
W Zhang, S Guo, H Zhang, Y Sui, Y Xue, Y Xu
IEEE Transactions on Software Engineering, 2023
62023
Sok: On the semantic ai security in autonomous driving
J Shen, N Wang, Z Wan, Y Luo, T Sato, Z Hu, X Zhang, S Guo, Z Zhong, ...
arXiv preprint arXiv:2203.05314, 2022
62022
Detecting safety problems of multi-sensor fusion in autonomous driving
Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray
arXiv preprint arXiv:2109.06404, 2021
62021
Coverage-based scene fuzzing for virtual autonomous driving testing
Z Hu, S Guo, Z Zhong, K Li
arXiv preprint arXiv:2106.00873, 2021
52021
Exposing cache timing side-channel leaks through out-of-order symbolic execution.
S Guo, Y Chen, J Yu, M Wu, Z Zuo, P Li, Y Cheng, H Wang
Proc. ACM Program. Lang. 4 (OOPSLA), 147:1-147:32, 2020
52020
Disclosing the fragility problem of virtual safety testing for autonomous driving systems
Z Hu, S Guo, Z Zhong, K Li
2021 IEEE International Symposium on Software Reliability Engineering …, 2021
32021
Detecting multi-sensor fusion errors in advanced driver-assistance systems
Z Zhong, Z Hu, S Guo, X Zhang, Z Zhong, B Ray
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
22022
PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications
MH Rahman, A Shamji, S Guo, G Li
Proceedings of the International Conference for High Performance Computing …, 2021
22021
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation
Y Cheng, Z Zhang, Y Gao, Z Chen, S Guo, Q Zhang, R Mei, S Nepal, ...
Computers & Security 113, 102556, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20