Program Analysis & Formal Methods
Research at the intersection of static analysis, formal verification, and systems security. Work published at IEEE, ASPLOS, ICSE, and DSN. Affiliated with Northeastern University and IMDEA Software Institute.
Research areas
Publications
Framework for patching legacy C/C++ codebases by replacing vulnerable functions with memory-safe Rust equivalents, operating on LLVM bitcode with data-flow analysis and symbolic execution validation.
Abstract interpretation framework for detecting semantic fragility in WebAssembly binaries. Analyzes how small perturbations in WASM modules affect observable program behavior.
Comprehensive dataset of WebAssembly vulnerabilities aggregated from multiple sources, enabling systematic security analysis and benchmarking of WASM analysis tools.
Symbolic execution pipeline targeting WebAssembly binaries using the Owi framework, enabling automated vulnerability detection and property verification.
Runtime memory protection system for WebAssembly execution environments, providing fine-grained isolation guarantees beyond the standard WASM sandboxing model.
Affiliations