Jiaxu Zhao

Google Scholar
3 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems.
2024
conf/uss
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems.
Filters
Years:  to