Follow
Petar Tsankov
Petar Tsankov
Co-founder & CEO, LatticeFlow
Verified email at latticeflow.ai - Homepage
Title
Cited by
Cited by
Year
Securify: Practical security analysis of smart contracts
P Tsankov, A Dan, D Drachsler-Cohen, A Gervais, F Buenzli, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
11532018
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
T Gehr, M Mirman, D Drachsler-Cohen, P Tsankov, S Chaudhuri, ...
IEEE Security and Privacy 2018, 2018
10982018
VerX: Safety Verification of Smart Contracts
A Permenev, D Dimitrov, P Tsankov, D Drachsler-Cohen, M Vechev
IEEE Security and Privacy 2020, 2020
3282020
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts
J He, M Balunović, N Ambroladze, P Tsankov, M Vechev
ACM CCS, 2019
2792019
Statistical deobfuscation of android applications
B Bichsel, V Raychev, P Tsankov, M Vechev
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1672016
Debin: Predicting debug information in stripped binaries
J He, P Ivanov, P Tsankov, V Raychev, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1402018
{NetComplete}: Practical {Network-Wide} configuration synthesis with autocompletion
A El-Hassany, P Tsankov, L Vanbever, M Vechev
15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018
1242018
zkay: Specifying and Enforcing Data Privacy in Smart Contracts
S Steffen, B Bichsel, M Gersbach, N Melchior, P Tsankov, M Vechev
ACM CCS, 2019
1092019
SECFUZZ: Fuzz-testing security protocols
P Tsankov, MT Dashti, D Basin
IEEE/ACM AST 2012, 1-7, 2012
1092012
Network-wide configuration synthesis
A El-Hassany, P Tsankov, L Vanbever, M Vechev
Computer Aided Verification: 29th International Conference, CAV 2017 …, 2017
1002017
{NetHide}: Secure and practical network topology obfuscation
R Meier, P Tsankov, V Lenders, L Vanbever, M Vechev
27th USENIX Security Symposium (USENIX Security 18), 693-709, 2018
972018
Dp-finder: Finding differential privacy violations by sampling and optimization
B Bichsel, T Gehr, D Drachsler-Cohen, P Tsankov, M Vechev
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
772018
Probabilistic verification of network configurations
S Steffen, T Gehr, P Tsankov, L Vanbever, M Vechev
ACM SIGCOMM, 750-764, 2020
572020
Inferring crypto API rules from code changes
R Paletov, P Tsankov, V Raychev, M Vechev
ACM SIGPLAN Notices 53 (4), 450-464, 2018
492018
Learning to Explore Paths for Symbolic Execution
J He, G Sivanrupan, P Tsankov, M Vechev
ACM CCS, 2021
382021
Automated discovery of adaptive attacks on adversarial defenses
C Yao, P Bielik, P Tsankov, M Vechev
Advances in Neural Information Processing Systems 34, 26858-26870, 2021
292021
Bayonet: probabilistic inference for networks
T Gehr, S Misailovic, P Tsankov, L Vanbever, P Wiesmann, M Vechev
ACM SIGPLAN Notices 53 (4), 586-602, 2018
292018
Decentralized composite access control
P Tsankov, S Marinovic, MT Dashti, D Basin
Principles of Security and Trust, 245-264, 2014
262014
Synthesis of Probabilistic Privacy Enforcement
M Kučera, P Tsankov, T Gehr, M Guarnieri, M Vechev
ACM CCS 2017, 2017
232017
Semi-valid input coverage for fuzz testing
P Tsankov, MT Dashti, D Basin
ACM ISSTA 2013, 2013
222013
The system can't perform the operation now. Try again later.
Articles 1–20