Publications
GrammaTech Research
GrammaTech is a spin-off from Cornell University, and for over three decades has fostered a culture of creative thinking, cutting edge research, and technology development. Check out some of our published papers below.
Evolving Exact Decompilation
Authors:Alexey LoginovDavid CiarlettaEric SchulteJason RuchtiMatt NoonanWorkshop on Binary Analysis Research (BAR)
|
Vertx: Automated Validation of Binary Transformations
Authors:David MelskiDenis GopanPeter OhmannWorkshop on Forming an Ecosystem Around Software Transformation, FEAST
|
MuSynth: Program Synthesis via Code Reuse and Code Manipulation
Authors:David MelskiEric M. SchulteRebecca SwordsVineeth KashyapSearch Based Software Engineering – 9th International Symposium, SSBSE
|
Source Forager: A Search Engine for Similar Source Code
Authors:Ben LiblitDavid Bingham BrownDavid MelskiThomas W. RepsVineeth KashyaparXiv
|
Data-Driven Program Completion
Authors:Chris JermaineDavid MelskiSwarat ChaudhuriYanxin LuarXiv
|
Software Transformation: Applications, Tools, Challenges, and Program Representation
Authors:Dave MelskiEric SchulteMichael McDougallWorkshop on Forming an Ecosystem Around Software Transformation (FEAST)
|
Polymorphic type inference for machine code
Authors:Alexey LoginovDavid CokMatthew NoonanProceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI
|
Repairing COTS Router Firmware without Access to Source Code or Test Suites: A Case Study in Evolutionary Software Repair
Authors:Eric M. SchulteStephanie ForrestWestley WeimerGenetic and Evolutionary Computation Conference, GECCO
|
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery
Authors:Alexey LoginovDavid MelskiDenis GopanDimitri NaydichDucson NguyenEvan Driscoll37th IEEE/ACM International Conference on Software Engineering, ICSE
|
Exploiting and Protecting Dynamic Code Generation
Authors:Chao ZhangChengyu SongDavid MelskiTielei WangWenke Lee2nd Annual Network and Distributed System Security Symposium, NDSS
|
To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing
Authors:Anh Nguyen-TuongDavid HydeDavid MelskiJack W. DavidsonJason HiserJohn C. KnightMichele CoNathan KennedyWilliam EllaTenth European Dependable Computing Conference
|
Preventing Exploits Against Software of Uncertain Provenance
Authors:David MelskiHigh Confidence Software and Systems Conference
|