Luke Dramko, Jeremy Lacomis,
Edward J. Schwartz, Bogdan Vasilescu and Claire Le Goues.
A Taxonomy of C Decompiler Fidelity Issues,
(PDF) Proceedings of the 2024 USENIX Security Symposium.
Alex Shypula, Pengcheng Yin, Jeremy Lacomis, Claire Le Goues,
Edward Schwartz, and Graham Neubig.
Learning to Superoptimize Real-world Programs,
(Arxiv) (PDF) Proceedings of the 2022 Deep Learning for Code Workshop at the International Conference on Learning Representations.
Received best paper award.Qibin Chen, Jeremy Lacomis,
Edward J. Schwartz, Graham Neubig, Bogdan Vasilescu, and Claire Le Goues.
VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning,
(ACM) (Video) (PDF) Proceedings of the 2022 International Conference on Software Engineering.
Qibin Chen, Jeremy Lacomis,
Edward J. Schwartz, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu.
Augmenting Decompiler Output with Learned Variable Names and Types,
(PDF) Proceedings of the 2022 USENIX Security Symposium.
Received distinguished paper award.Edward J. Schwartz, Cory F. Cohen, Jeffrey S. Gennari and Stephanie M. Schwartz.
A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks,
(PDF) (View PPTX slides) (Download PPTX Slides) (Video) Proceedings of the 2020 ACM Conference on Computer and Communications Security.
Valentin J.M. Manès, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele,
Edward J. Schwartz, and Maverick Woo.
The Art, Science, and Engineering of Fuzzing: A Survey,
(PDF) Proceedings of the 2020 International Conference on Software Engineering.
Jeremy Lacomis, Pengcheng Yin,
Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu.
DIRE: A Neural Approach to Decompiled Identifier Renaming,
(PDF) Procedings of the 2019 IEEE/ACM International Conference on Automated Software Engineering.
Edward J. Schwartz, Cory Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, and Charles Hines.
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables,
(PDF) (PDF slides) (PPTX slides) (Video) Procedings of the 2018 ACM Conference on Computer and Communications Security.
Jeffrey Gennari, Arie Gurfinkel, Temesghen Kahsai, Jorge A. Navas, and
Edward J. Schwartz.
Executable Counterexamples in Software Model Checking,
(PDF) (PDF slides) Proceedings of the 2018 Working Conference on Verified Software: Theories, Tools, and Experiments.
Alan Jaffe, Jeremy Lacomis,
Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu.
Meaningful Variable Names for Decompiled Code: A Machine Translation Approach,
(PDF) (PDF slides) Proceedings of the 2018 IEEE/ACM International Conference on Program Comprehension.
Jeremy Lacomis, Alan Jaffe,
Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu.
Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code,
(PDF) Proceedings of the 2018 AAAI Workshop on Statistical Modeling of Natural Software Corpora.
Robert L. Nord, Ipek Ozkaya,
Edward J. Schwartz, Forrest Shull, and Rick Kazman.
Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? (PDF) Proceedings of the 2016 USENIX Workshop on Cyber Security Experimentation and Test.
Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.
Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring,
(PDF) (PDF slides) (PPTX slides) Proceedings of the 2013 USENIX Security Symposium.
David Brumley, Ivan Jager, Thanassis Avgerinos,
Edward J. Schwartz.
BAP: A Binary Analysis Platform,
(PDF) (PDF Slides) Proceedings of Computer Aided Verification 2011.
Edward J. Schwartz, Thanassis Avgerinos, David Brumley.
All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask),
(PDF) (PDF Slides) Proceedings of the 2010 IEEE Symposium on Security and Privacy.
Edward J. Schwartz, David Brumley, Jonathan M. McCune.
A Contractual Anonymity System,
(PDF) (PDF Slides) Proceedings of the 2010 Network and Distributed System Security Syposium.
Kevin Mills, Edward Schwartz, Jian Yuan. How to Model a TCP/IP Network using only 20 Parameters, Proceedings of the 2010 Winter Simulation Conference.
Seniz Demir, David Oliver,
Edward Schwartz, Stephanie Elzer, Sandra Carberry, Kathleen F. McCoy.
Interactive SIGHT into Information Graphics,
(PDF) Proceedings of the 2010 Conference on Web Accessibiliy (W4A).
Stephanie Elzer,
Edward Schwartz, Sandra Carberry, Daniel Chester, and Peng Wu.
Accessible Bar Charts for Visually Impaired Users,
(PDF) Proceedings of the 2008 International Conference on Telehealth and Assistive Technologies.
Edward Schwartz and Stephanie Elzer.
An Introduction to COM, ATL and the Windows API Through Creation of an Internet Explorer Browser Helper Object,
(DOC) Proceedings of the 2007 Pennsylvania Association of Computing and Information Science Educators Conference.
Stephanie Elzer,
Edward Schwartz, Sandra Carberry, Daniel Chester, Seniz Demir, and Peng Wu.
A Browser Extension for Providing Visually Impaired Users Access to the Content of Bar Charts on the Web,
(PDF) Proceedings of the 2007 International Conference on Web Information Systems and Technologies.