Get my own profile
Co-authors
Marco PistoiaJPMorgan Chase & Co.Verified email at jpmchase.com
Roee HayVulnerability researcherVerified email at securityresear.ch
Julian DolbyIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Manu SridharanAssociate Professor, Computer Science and Engineering, University of California, RiversideVerified email at sridharan.net
Patrick CousotProfessor of Computer Science, CIMS, New York UniversityVerified email at cims.nyu.edu
Mooly SagivTel Aviv UniversityVerified email at acm.org
Liu PengRSM@IBM ResearchVerified email at us.ibm.com
Julia RubinUniversity of British ColumbiaVerified email at ubc.ca
Mayur NaikProfessor of Computer Science, University of PennsylvaniaVerified email at cis.upenn.edu
Percy LiangAssociate Professor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Yishai A. FeldmanIBM Research - HaifaVerified email at il.ibm.com
Ran EttingerBen-Gurion University and the Academic College of Tel Aviv - YaffoVerified email at post.bgu.ac.il
Martin VechevProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Simon Holm JensenSamsung Research AmericaVerified email at hjensen.net
Greta YorshLecturer at the School of Electronic Engineering and Computer Science, Queen Mary University of LondonVerified email at qmul.ac.uk
Roman ManevichFacebookVerified email at fb.com
Dror FeitelsonHebrew UniversityVerified email at cs.huji.ac.il

Omer Tripp
Amazon
Verified email at google.com