default search action
Lucas Bang
Person information
- affiliation: Harvey Mudd College, CA, USA
- affiliation (PhD 2018): University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Mira Bhagirathi Kaniyur, Ana Cavalcante-Studart, Yihan Yang, Sangeon Park, David Chen, Duy Lam, Lucas Bang:
Path Complexity Analysis for Interprocedural Code. ICSE Companion 2024: 404-405 - [c18]Mira Bhagirathi Kaniyur, Ana Cavalcante-Studart, Yihan Yang, Sangeon Park, David Chen, Duy Lam, Lucas Bang:
Interprocedural Path Complexity Analysis. ISSTA 2024: 162-173 - 2023
- [j5]Seemanta Saha, Surendra Ghentiyala, Shihua Lu, Lucas Bang, Tevfik Bultan:
Obtaining Information Leakage Bounds via Approximate Model Counting. Proc. ACM Program. Lang. 7(PLDI): 1488-1509 (2023) - [c17]Eli Pregerson, Shaheen Cullen-Baratloo, David Chen, Duy Lam, Max Szostak, Lucas Bang:
Formalizing Path Explosion for Recursive Functions via Asymptotic Path Complexity. FormaliSE 2023: 76-85 - [c16]Katherine Breeden, Lucas Bang, Christopher A. Stone, Julie Medero:
Student Experiences and Academic Outcomes When Multiple Introductory Tracks Converge. ITiCSE (1) 2023: 89-95 - [c15]Sofiane Dissem, Eli Pregerson, Adi Bhargava, Josh Cordova, Lucas Bang:
Path Complexity Correlates with Source Code Comprehension Effort Indicators. ICPC 2023: 266-274 - 2021
- [c14]Gabriel Bessler, Josh Cordova, Shaheen Cullen-Baratloo, Sofiane Dissem, Emily Lu, Sofia Devin, Ibrahim Abughararh, Lucas Bang:
Metrinome: Path Complexity Predicts Symbolic Execution Path Explosion. ICSE (Companion Volume) 2021: 29-32 - 2020
- [j4]Cyrille Artho, Quoc-Sang Phan, Peter Aldous, Alyas Almaawi, Lucas Bang, Lasse Berglund, Tevfik Bultan, Zhenbang Chen, Hayes Converse, Wei Dong, William Eiers, Milos Gligoric, Simon Goldsmith, Lars Grunske, Joshua Hooker, Ismet Burak Kadron, Timo Kehrer, Sarfraz Khurshid, Xuan-Bach Dinh Le, David Lo, Eric Mercer, Sasa Misailovic, Egor Namakonov, Hoang Lam Nguyen, Yannic Noller, Benjamin Ogles, Rohan Padhye, Pavel Parízek, Corina S. Pasareanu, Sheridan Jacob Powell, Seemanta Saha, Koushik Sen, Elena Sherman, Kyle Storey, Minxing Tang, Willem Visser, Ji Wang, Hengbiao Yu:
The Java Pathfinder Workshop 2019. ACM SIGSOFT Softw. Eng. Notes 45(2): 20-22 (2020) - [c13]Devon Frost, Shannon Steele, Lucas Bang:
Virtually Constrained Dancing: Encoding Language in Movement and Sound. MOCO 2020: 12:1-12:4 - [c12]Abtin Molavi, Mara Downing, Tommy Schneider, Lucas Bang:
MCBAT: a practical tool for model counting constraints on bounded integer arrays. ESEC/SIGSOFT FSE 2020: 1596-1600 - [c11]Abtin Molavi, Tommy Schneider, Mara Downing, Lucas Bang:
MCBAT: Model Counting for Constraints over Bounded Integer Arrays. VSTTE 2020: 124-143 - [c10]Mara Downing, Abtin Molavi, Lucas Bang:
Symbolic Execution + Model Counting + Entropy Maximization = Automatic Search Synthesis. GandALF 2020: 50-65
2010 – 2019
- 2019
- [j3]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Attack Synthesis. ACM SIGSOFT Softw. Eng. Notes 44(4): 16 (2019) - [c9]Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Profit: Detecting and Quantifying Side Channels in Networked Applications. NDSS 2019 - [i3]Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Incremental Adaptive Attack Synthesis. CoRR abs/1905.05322 (2019) - [i2]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. CoRR abs/1907.11710 (2019) - 2018
- [b1]Lucas Adam Bang:
Software Side-Channel Analysis. University of California, Santa Barbara, USA, 2018 - [j2]Seemanta Saha, Ismet Burak Kadron, William Eiers, Lucas Bang, Tevfik Bultan:
Attack Synthesis for Strings using Meta-Heuristics. ACM SIGSOFT Softw. Eng. Notes 43(4): 56 (2018) - [c8]Nestan Tsiskaridze, Lucas Bang, Joseph McMahan, Tevfik Bultan, Timothy Sherwood:
Information Leakage in Arbiter Protocols. ATVA 2018: 404-421 - [c7]Lucas Bang, Nicolás Rosner, Tevfik Bultan:
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. EuroS&P 2018: 307-322 - [c6]Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. ESEC/SIGSOFT FSE 2018: 400-410 - 2017
- [c5]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. CSF 2017: 328-342 - [i1]Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 401 (2017) - 2016
- [c4]Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan:
String analysis for side channels with segmented oracles. SIGSOFT FSE 2016: 193-204 - 2015
- [j1]Lucas Bang, Wolfgang W. Bein, Lawrence L. Larmore:
R-LINE: A better randomized 2-server algorithm on the line. Theor. Comput. Sci. 605: 106-118 (2015) - [c3]Abdulbaki Aydin, Lucas Bang, Tevfik Bultan:
Automata-Based Model Counting for String Constraints. CAV (1) 2015: 255-272 - [c2]Lucas Bang, Abdulbaki Aydin, Tevfik Bultan:
Automatically computing path complexity of programs. ESEC/SIGSOFT FSE 2015: 61-72 - 2012
- [c1]Lucas Bang, Wolfgang W. Bein, Lawrence L. Larmore:
R-LINE: A Better Randomized 2-Server Algorithm on the Line. WAOA 2012: 120-130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint