Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CompCertELF: verified separate compilation of C programs into ELF object files., , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 197:1-197:28 (2020)Towards a Framework for Developing Verified Assemblers for the ELF Format., , , , and . APLAS, volume 14405 of Lecture Notes in Computer Science, page 205-224. Springer, (2023)Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis., , , , , , , , , and . ISSTA, page 1106-1118. ACM, (2023)Detecting Backdoors in Pre-trained Encoders., , , , , , , , and . CVPR, page 16352-16362. IEEE, (2023)BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2023)Checkpointing and deterministic training for deep learning., , , , and . CAIN, page 65-76. ACM, (2022)The Classification and Propagation of Program Comments.. ASE, page 1394-1396. IEEE, (2020)CPC: automatically classifying and propagating natural language comments via program analysis., , , , , , , , , and . ICSE, page 1359-1371. ACM, (2020)Nova+: Generative Language Models for Binaries., , , , , and . CoRR, (2023)Extracting Protocol Format as State Machine via Controlled Static Loop Analysis., , and . USENIX Security Symposium, page 7019-7036. USENIX Association, (2023)