Author of the publication

IntFlow: improving the accuracy of arithmetic error detection using information flow tracking.

, , , , and . ACSAC, page 416-425. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , and . ACM Conference on Computer and Communications Security, page 504-516. ACM, (2016)On Efficiency and Accuracy of Data Flow Tracking Systems.. Columbia University, USA, (2015)ShadowReplica: efficient parallelization of dynamic data flow tracking., , , and . CCS, page 235-246. ACM, (2013)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , and . ACSAC, page 416-425. ACM, (2014)SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression., , , , , and . USENIX Security Symposium, page 2987-3004. USENIX Association, (2021)Countering Malicious Processes with Process-DNS Association., , , , , , , , and . NDSS, The Internet Society, (2019)Evading Provenance-Based ML Detectors with Adversarial System Actions., , , , , , , and . USENIX Security Symposium, page 1199-1216. USENIX Association, (2023)This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage., , , , , , , , , and 1 other author(s). ACSAC, page 165-178. ACM, (2020)libdft: practical dynamic data flow tracking for commodity systems., , , and . VEE, page 121-132. ACM, (2012)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)