Edward J. Schwartz's publications

Also see all authors, all publications by date, all publications by topic.

Copyright notice.


“A Taxonomy of C Decompiler Fidelity Issues”
by Luke Dramko, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, and Claire Le Goues.
In Proceedings of the USENIX Security Symposium, 2024.
Details. Download: PDF.

“DIRE and its Data: Neural Decompiled Variable Renamings with Respect to Software Class”
by Luke Dramko, Jeremy Lacomis, Pengching Yin, Edward J. Schwartz, Miltiadis Allamanis, Graham Neubig, Bogdan Vasilescu, and Claire Le Goues.
{ACM} Transactions on Software Engineering and Methodology, vol. 32, no. 2, 2022.
Details. Download: ACM Link, PDF.

“VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning”
by Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Graham Neubig, Bogdan Vasilescu, and Claire Le Goues.
In Proceedings of the International Conference on Software Engineering, 2022.
Details. Download: Paper, ACM Link, Video.

“Augmenting Decompiler Output with Learned Variable Names and Types”
by Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu.
In Proceedings of the USENIX Security Symposium, 2022.
Details. Download: Paper.

“A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks”
by Edward J. Schwartz, Stephanie M. Schwartz, Cory F. Cohen, and Jeffrey S. Gennari.
In Proceedings of the ACM Conference on Computer and Communications Security, 2020.
Details. Download: Paper, View PPTX Slides, Download PPTX Slides, Video.

“DIRE: A Neural Approach to Decompiled Identifier Naming”
by Jeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu.
In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2019.
Details. Download: Paper.

“Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables”
by Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, and Charles Hines.
In Proceedings of the ACM Conference on Computer and Communications Security, 2018.
Details. Download: Paper, PDF Slides, PPTX Slides, Video.

“Meaningful Variable Names for Decompiled Code: A Machine Translation Approach”
by Alan Jaffe, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu.
In Proceedings of the IEEE/ACM International Conference on Program Comprehension, 2018.
Details. Download: Paper, PDF Slides.

“Executable Counterexamples in Software Model Checking”
by Jeffrey Gennari, Arie Gurfinkel, Temesghen Kahsai, Jorge A. Navas, and Edward J. Schwartz.
In Proceedings of the Working Conference on Verified Software: Theories, Tools, and Experiments, 2018.
Details. Download: Paper, PDF Slides.

“Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?”
by Robert L. Nord, Ipek Ozkaya, Edward J. Schwartz, Forrest Shull, and Rick Kazman.
In Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test, 2016.
Details. Download: Paper.

“Abstraction Recovery for Scalable Static Binary Analysis”
by Edward J. Schwartz.
Ph.D. dissertation, Carnegie Mellon University, 2014.
Details. Download: Paper.

“Automatic Exploit Generation”
by Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumley.
Communications of the Association for Computing Machinery, vol. 57, no. 2, Feb. 2014, pp. 74-84.
Details. Download: CACM Link.

“Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring”
by Edward J. Schwartz, JongHyup Lee, Maverick Woo, and David Brumley.
In Proceedings of the USENIX Security Symposium, 2013.
Details. Download: Paper, PDF Slides, PPTX Slides.

“Q: Exploit Hardening Made Easy”
by Edward J. Schwartz, Thanassis Avgerinos, and David Brumley.
In Proceedings of the USENIX Security Symposium, 2011.
Details. Download: Paper, Update Note, PDF Slides, PPTX Slides, Video, Audio.

“BAP: A Binary Analysis Platform”
by David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz.
In Proceedings of the Conference on Computer Aided Verification, 2011.
Details. Download: Paper, Slides.

“All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)”
by Edward J. Schwartz, Thanassis Avgerinos, and David Brumley.
In Proceedings of the IEEE Symposium on Security and Privacy, 2010.
Details. Download: Paper, Slides.

“A Contractual Anonymity System”
by Edward J. Schwartz, David Brumley, and Jonathan M. McCune.
In Proceedings of the Network and Distributed System Security Symposium, 2010.
Details. Download: Paper, Slides.


Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


(This webpage was created with bibtex2web.)

Back to Program Analysis Group authors