BiBTeX Entries
You can find a link to BiBTeX entries for all recent papers here.

Refereed Conference and Workshop Papers

Jeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, and Bogdan Vasilescu. DIRE: A Neural Approach to Decompiled Identifier Renaming, (PDF) Procedings of the 2019 IEEE/ACM International Conference on Automated Software Engineering.
Edward J. Schwartz, Cory Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, and Charles Hines. Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables, (PDF) (PDF slides) (PPTX slides) (Video) Procedings of the 2018 ACM Conference on Computer and Communications Security.
Jeffrey Gennari, Arie Gurfinkel, Temesghen Kahsai, Jorge A. Navas, and Edward J. Schwartz. Executable Counterexamples in Software Model Checking, (PDF) (PDF slides) Proceedings of the 2018 Working Conference on Verified Software: Theories, Tools, and Experiments.
Alan Jaffe, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu. Meaningful Variable Names for Decompiled Code: A Machine Translation Approach, (PDF) (PDF slides) Proceedings of the 2018 IEEE/ACM International Conference on Program Comprehension.
Jeremy Lacomis, Alan Jaffe, Edward J. Schwartz, Claire Le Goues, and Bogdan Vasilescu. Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code, (PDF) Proceedings of the 2018 AAAI Workshop on Statistical Modeling of Natural Software Corpora.
Robert L. Nord, Ipek Ozkaya, Edward J. Schwartz, Forrest Shull, and Rick Kazman. Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? (PDF) Proceedings of the 2016 USENIX Workshop on Cyber Security Experimentation and Test.
Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley. Native x86 Decompilation using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring, (PDF) (PDF slides) (PPTX slides) Proceedings of the 2013 USENIX Security Symposium.
Edward J. Schwartz, Thanassis Avgerinos, David Brumley. Q: Exploit Hardening Made Easy, (PDF) (PDF Update Note) (PDF Slides) (PPTX Slides) (Video) (Audio) Proceedings of the 2011 USENIX Security Symposium.
David Brumley, Ivan Jager, Thanassis Avgerinos, Edward J. Schwartz. BAP: A Binary Analysis Platform, (PDF) (PDF Slides) Proceedings of Computer Aided Verification 2011.
Edward J. Schwartz, Thanassis Avgerinos, David Brumley. All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask), (PDF) (PDF Slides) Proceedings of the 2010 IEEE Symposium on Security and Privacy.
Edward J. Schwartz, David Brumley, Jonathan M. McCune. A Contractual Anonymity System, (PDF) (PDF Slides) Proceedings of the 2010 Network and Distributed System Security Syposium.
Kevin Mills, Edward Schwartz, Jian Yuan. How to Model a TCP/IP Network using only 20 Parameters, Proceedings of the 2010 Winter Simulation Conference.
Seniz Demir, David Oliver, Edward Schwartz, Stephanie Elzer, Sandra Carberry, Kathleen F. McCoy. Interactive SIGHT into Information Graphics, (PDF) Proceedings of the 2010 Conference on Web Accessibiliy (W4A).
Stephanie Elzer, Edward Schwartz, Sandra Carberry, Daniel Chester, and Peng Wu. Accessible Bar Charts for Visually Impaired Users,(PDF) Proceedings of the 2008 International Conference on Telehealth and Assistive Technologies.
Edward Schwartz and Stephanie Elzer. An Introduction to COM, ATL and the Windows API Through Creation of an Internet Explorer Browser Helper Object, (DOC) Proceedings of the 2007 Pennsylvania Association of Computing and Information Science Educators Conference.
Stephanie Elzer, Edward Schwartz, Sandra Carberry, Daniel Chester, Seniz Demir, and Peng Wu. A Browser Extension for Providing Visually Impaired Users Access to the Content of Bar Charts on the Web, (PDF) Proceedings of the 2007 International Conference on Web Information Systems and Technologies.

Refereed Journal and Magazine Articles

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley. Automatic Exploit Generation, (Download) In Communications of the ACM, February 2014, 57(2), doi:10.1145/2560217.2560219.
Demir, S., Oliver, D., Schwartz, E., Elzer, S., Carberry, S., Mccoy, K. F., et al. Interactive SIGHT: textual access to simple bar charts, New Review of Hypermedia and Multimedia, 2010, 16(3), doi:10.1080/13614568.2010.534186

Invited Talks, Papers, and Keynote Presentations

Edward J. Schwartz. Abstraction Recovery for Scalable Static Binary Analysis, (PDF slides) (PPTX slides) Keynote presentation at the 4th Program Protection and Reverse Engineering Workshop (PPREW).
Edward J. Schwartz, Thanassis Avgerinos, David Brumley. All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask), (PDF) (PDF Slides) Invited Paper at 2010 Workshop on Offensive Technologies (WooT).

Magazine Articles, Technical Reports, Book Chapters, and Theses

Edward Schwartz. Abstraction Recovery for Scalable Static Binary Analysis, (PDF) Ph.D. thesis.
Edward J. Schwartz. The Danger of Unrandomized Code. (PDF) (Issue Information) Usenix ;login: Magazine, December 2011, Volume 36, Number 6.
K. Mills, J. Filliben, D. Cho, E. Schwartz, and D. Genin. NIST SP 500-282: Study of Proposed Internet Congestion-Control Mechanisms, (Links) National Institute of Standards and Technology (NIST) study.
Stephanie Elzer, Edward Schwartz, Sandra Carberry, Daniel Chester, Seniz Demir and Peng Wu. Bar Charts in Popular Media: Conveying Their Message to Visually Impaired Users via Speech, Book chapter in Advances in Intelligent Information Systems, Studies in Computational Intelligence Series, Springer, 2009.
Edward Schwartz. Contractual Anonymity, Master's thesis.
Edward Schwartz. A Browser Extension for Providing Visually Impaired Users Access to the Content of Bar Charts on the Web, Undergraduate thesis.

Powered with by Gatsby 2.0