1. Improving Security Through Egalitarian Binary Recompilation Williams-King, David Christopher 2021 Theses Computer scienceComputer engineeringComputer programmingComputer security--Computer programsSource code (Computer science)
2. Probabilistic Programming for Deep Learning Tran, Dustin 2020 Theses Artificial intelligenceStatisticsMachine learning--Statistical methodsComputer programmingBayesian statistical decision theory--Mathematical models
3. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
4. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
5. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Chapters (Layout Features) Malware (Computer software)Computer programmingComputer securityComputer science
6. Symbiotes and defensive Mutualism: Moving Target Defense Cui, Ang; Stolfo, Salvatore 2011 Chapters (Layout Features) Computer software--Design and constructionComputer programmingComputer securityComputer science
7. Memory-Based Parsing Lebowitz, Michael 1981 Reports Memory management (Computer science)Computer programmingComputational learning theory