var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/dblp/jinseong_jeon?jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/dblp/jinseong_jeon?jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/dblp/jinseong_jeon?jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An empirical study of adaptive concretization for parallel program synthesis.\n \n \n \n \n\n\n \n Jeon, J.; Qiu, X.; Solar-Lezama, A.; and Foster, J. S.\n\n\n \n\n\n\n Formal Methods Syst. Des., 50(1): 75–95. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fmsd/JeonQSF17,\n  author       = {Jinseong Jeon and\n                  Xiaokang Qiu and\n                  Armando Solar{-}Lezama and\n                  Jeffrey S. Foster},\n  title        = {An empirical study of adaptive concretization for parallel program\n                  synthesis},\n  journal      = {Formal Methods Syst. Des.},\n  volume       = {50},\n  number       = {1},\n  pages        = {75--95},\n  year         = {2017},\n  url          = {https://doi.org/10.1007/s10703-017-0269-8},\n  doi          = {10.1007/S10703-017-0269-8},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fmsd/JeonQSF17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Framework synthesis for Symbolic Execution of Event-Driven Frameworks.\n \n \n \n \n\n\n \n Jeon, J.\n\n\n \n\n\n\n Ph.D. Thesis, University of Maryland, College Park, MD, USA, 2016.\n \n\n\n\n
\n\n\n\n \n \n \"FrameworkPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{DBLP:phd/basesearch/Jeon16,\n  author       = {Jinseong Jeon},\n  title        = {Framework synthesis for Symbolic Execution of Event-Driven Frameworks},\n  school       = {University of Maryland, College Park, MD, {USA}},\n  year         = {2016},\n  url          = {https://hdl.handle.net/1903/18205},\n  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/phd/basesearch/Jeon16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Synthesizing framework models for symbolic execution.\n \n \n \n \n\n\n \n Jeon, J.; Qiu, X.; Fetter-Degges, J.; Foster, J. S.; and Solar-Lezama, A.\n\n\n \n\n\n\n In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pages 156–167, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"SynthesizingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/JeonQFFS16,\n  author       = {Jinseong Jeon and\n                  Xiaokang Qiu and\n                  Jonathan Fetter{-}Degges and\n                  Jeffrey S. Foster and\n                  Armando Solar{-}Lezama},\n  title        = {Synthesizing framework models for symbolic execution},\n  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,\n                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},\n  pages        = {156--167},\n  year         = {2016},\n  crossref     = {DBLP:conf/icse/2016},\n  url          = {https://doi.org/10.1145/2884781.2884856},\n  doi          = {10.1145/2884781.2884856},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icse/JeonQFFS16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Adaptive Concretization for Parallel Program Synthesis.\n \n \n \n \n\n\n \n Jeon, J.; Qiu, X.; Solar-Lezama, A.; and Foster, J. S.\n\n\n \n\n\n\n In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II, pages 377–394, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"AdaptivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cav/JeonQSF15,\n  author       = {Jinseong Jeon and\n                  Xiaokang Qiu and\n                  Armando Solar{-}Lezama and\n                  Jeffrey S. Foster},\n  title        = {Adaptive Concretization for Parallel Program Synthesis},\n  booktitle    = {Computer Aided Verification - 27th International Conference, {CAV}\n                  2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part\n                  {II}},\n  pages        = {377--394},\n  year         = {2015},\n  crossref     = {DBLP:conf/cav/2015},\n  url          = {https://doi.org/10.1007/978-3-319-21668-3\\_22},\n  doi          = {10.1007/978-3-319-21668-3\\_22},\n  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cav/JeonQSF15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution.\n \n \n \n \n\n\n \n Micinski, K. K.; Fetter-Degges, J.; Jeon, J.; Foster, J. S.; and Clarkson, M. R.\n\n\n \n\n\n\n In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, pages 520–538, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"CheckingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/MicinskiFJFC15,\n  author       = {Kristopher K. Micinski and\n                  Jonathan Fetter{-}Degges and\n                  Jinseong Jeon and\n                  Jeffrey S. Foster and\n                  Michael R. Clarkson},\n  title        = {Checking Interaction-Based Declassification Policies for Android Using\n                  Symbolic Execution},\n  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research\n                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,\n                  Part {II}},\n  pages        = {520--538},\n  year         = {2015},\n  crossref     = {DBLP:conf/esorics/2015-2},\n  url          = {https://doi.org/10.1007/978-3-319-24177-7\\_26},\n  doi          = {10.1007/978-3-319-24177-7\\_26},\n  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},\n  biburl       = {https://dblp.org/rec/conf/esorics/MicinskiFJFC15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n JSketch: sketching for Java.\n \n \n \n \n\n\n \n Jeon, J.; Qiu, X.; Foster, J. S.; and Solar-Lezama, A.\n\n\n \n\n\n\n In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2015, Bergamo, Italy, August 30 - September 4, 2015, pages 934–937, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"JSketch:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sigsoft/JeonQFS15,\n  author       = {Jinseong Jeon and\n                  Xiaokang Qiu and\n                  Jeffrey S. Foster and\n                  Armando Solar{-}Lezama},\n  title        = {JSketch: sketching for Java},\n  booktitle    = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software\n                  Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September\n                  4, 2015},\n  pages        = {934--937},\n  year         = {2015},\n  crossref     = {DBLP:conf/sigsoft/2015},\n  url          = {https://doi.org/10.1145/2786805.2803189},\n  doi          = {10.1145/2786805.2803189},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sigsoft/JeonQFS15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution.\n \n \n \n \n\n\n \n Micinski, K. K.; Fetter-Degges, J.; Jeon, J.; Foster, J. S.; and Clarkson, M. R.\n\n\n \n\n\n\n CoRR, abs/1504.03711. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"CheckingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/MicinskiFJFC15,\n  author       = {Kristopher K. Micinski and\n                  Jonathan Fetter{-}Degges and\n                  Jinseong Jeon and\n                  Jeffrey S. Foster and\n                  Michael R. Clarkson},\n  title        = {Checking Interaction-Based Declassification Policies for Android Using\n                  Symbolic Execution},\n  journal      = {CoRR},\n  volume       = {abs/1504.03711},\n  year         = {2015},\n  url          = {http://arxiv.org/abs/1504.03711},\n  eprinttype    = {arXiv},\n  eprint       = {1504.03711},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/MicinskiFJFC15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n JSKETCH: Sketching for Java.\n \n \n \n \n\n\n \n Jeon, J.; Qiu, X.; Foster, J. S.; and Solar-Lezama, A.\n\n\n \n\n\n\n CoRR, abs/1507.03577. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"JSKETCH:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/JeonQFS15,\n  author       = {Jinseong Jeon and\n                  Xiaokang Qiu and\n                  Jeffrey S. Foster and\n                  Armando Solar{-}Lezama},\n  title        = {{JSKETCH:} Sketching for Java},\n  journal      = {CoRR},\n  volume       = {abs/1507.03577},\n  year         = {2015},\n  url          = {http://arxiv.org/abs/1507.03577},\n  eprinttype    = {arXiv},\n  eprint       = {1507.03577},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/JeonQFS15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Brahmastra: Driving Apps to Test the Security of Third-Party Components.\n \n \n \n \n\n\n \n Bhoraskar, R.; Han, S.; Jeon, J.; Azim, T.; Chen, S.; Jung, J.; Nath, S.; Wang, R.; and Wetherall, D.\n\n\n \n\n\n\n In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014, pages 1021–1036, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Brahmastra:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uss/BhoraskarHJACJN0W14,\n  author       = {Ravi Bhoraskar and\n                  Seungyeop Han and\n                  Jinseong Jeon and\n                  Tanzirul Azim and\n                  Shuo Chen and\n                  Jaeyeon Jung and\n                  Suman Nath and\n                  Rui Wang and\n                  David Wetherall},\n  title        = {Brahmastra: Driving Apps to Test the Security of Third-Party Components},\n  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,\n                  USA, August 20-22, 2014},\n  pages        = {1021--1036},\n  year         = {2014},\n  crossref     = {DBLP:conf/uss/2014},\n  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/bhoraskar},\n  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},\n  biburl       = {https://dblp.org/rec/conf/uss/BhoraskarHJACJN0W14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Dr. Android and Mr. Hide: fine-grained permissions in android applications.\n \n \n \n \n\n\n \n Jeon, J.; Micinski, K. K.; Vaughan, J. A.; Fogel, A.; Reddy, N.; Foster, J. S.; and Millstein, T. D.\n\n\n \n\n\n\n In SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA, pages 3–14, 2012. \n \n\n\n\n
\n\n\n\n \n \n \"Dr.Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccs/JeonMVFRFM12,\n  author       = {Jinseong Jeon and\n                  Kristopher K. Micinski and\n                  Jeffrey A. Vaughan and\n                  Ari Fogel and\n                  Nikhilesh Reddy and\n                  Jeffrey S. Foster and\n                  Todd D. Millstein},\n  title        = {Dr. Android and Mr. Hide: fine-grained permissions in android applications},\n  booktitle    = {SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones\n                  and Mobile Devices, Co-located with {CCS} 2012, October 19, 2012,\n                  Raleigh, NC, {USA}},\n  pages        = {3--14},\n  year         = {2012},\n  crossref     = {DBLP:conf/ccs/2012spsm},\n  url          = {https://doi.org/10.1145/2381934.2381938},\n  doi          = {10.1145/2381934.2381938},\n  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccs/JeonMVFRFM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Abstracting access patterns of dynamic memory using regular expressions.\n \n \n \n \n\n\n \n Jeon, J.; Shin, K.; and Han, H.\n\n\n \n\n\n\n ACM Trans. Archit. Code Optim., 5(4): 18:1–18:28. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"AbstractingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/taco/JeonSH09,\n  author       = {Jinseong Jeon and\n                  Keoncheol Shin and\n                  Hwansoo Han},\n  title        = {Abstracting access patterns of dynamic memory using regular expressions},\n  journal      = {{ACM} Trans. Archit. Code Optim.},\n  volume       = {5},\n  number       = {4},\n  pages        = {18:1--18:28},\n  year         = {2009},\n  url          = {https://doi.org/10.1145/1498690.1498693},\n  doi          = {10.1145/1498690.1498693},\n  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/taco/JeonSH09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Layout Transformations for Heap Objects Using Static Access Patterns.\n \n \n \n \n\n\n \n Jeon, J.; Shin, K.; and Han, H.\n\n\n \n\n\n\n In Compiler Construction, 16th International Conference, CC 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007, Braga, Portugal, March 26-30, 2007, Proceedings, pages 187–201, 2007. \n \n\n\n\n
\n\n\n\n \n \n \"LayoutPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cc/JeonSH07,\n  author       = {Jinseong Jeon and\n                  Keoncheol Shin and\n                  Hwansoo Han},\n  title        = {Layout Transformations for Heap Objects Using Static Access Patterns},\n  booktitle    = {Compiler Construction, 16th International Conference, {CC} 2007, Held\n                  as Part of the Joint European Conferences on Theory and Practice of\n                  Software, {ETAPS} 2007, Braga, Portugal, March 26-30, 2007, Proceedings},\n  pages        = {187--201},\n  year         = {2007},\n  crossref     = {DBLP:conf/cc/2007},\n  url          = {https://doi.org/10.1007/978-3-540-71229-9\\_13},\n  doi          = {10.1007/978-3-540-71229-9\\_13},\n  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/cc/JeonSH07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);