Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 413-430. USENIX Association, (2022)MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , and . HICSS, page 1-10. ScholarSpace, (2021)Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization., , , , , , and . NDSS, The Internet Society, (2020)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2021)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). SP, page 1109-1124. IEEE, (2021)Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)., , , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 117-146. Springer, (2021)CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing., , , , , , , , , and 3 other author(s). IEEE Secur. Priv., 20 (2): 10-21 (2022)"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers., , , , , , and . SP, page 1845-1862. IEEE, (2022)Understanding and Predicting Private Interactions in Underground Forums., , , , , and . CODASPY, page 303-314. ACM, (2019)