Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Large-Scale Empirical Study of Android App Decompilation., , and . SANER, page 400-410. IEEE, (2021)Robust Detection of Obfuscated Strings in Android Apps., , and . AISec@CCS, page 25-35. ACM, (2019)Scalable Dynamic Analysis of Binary Code.. Linköping University, Sweden, (2019)base-search.net (ftlinkoepinguniv:oai:DiVA.org:liu-157626).Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing., and . SCAM, page 155-164. IEEE Computer Society, (2014)Comment on ÄndrODet: An adaptive Android obfuscation detector"., , and . CoRR, (2019)Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps., , and . ARES, page 27:1-27:12. ACM, (2023)desync-cc: A research tool for automatically applying disassembly desynchronization during compilation., , , , , and . Sci. Comput. Program., (June 2023)Towards robust instruction-level trace alignment of binary code., and . ASE, page 342-352. IEEE Computer Society, (2017)InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries., and . SCAM, page 138-143. IEEE Computer Society, (2012)Android decompiler performance on benign and malicious apps: an empirical study., , and . Empir. Softw. Eng., 28 (2): 48 (March 2023)