Author of the publication

Exploit dynamic data flows to protect software against semantic attacks.

, , , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-6. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Code Diversity to Enhance Code Virtualization Protection., , , , , , , and . ICPADS, page 620-627. IEEE, (2018)SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data., , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (3): 98:1-98:34 (2018)Detecting code vulnerabilities by learning from large-scale open source repositories., , , , , , and . J. Inf. Secur. Appl., (2022)A Novel Method for Protritage Site with WSN., , , , , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 765-776. Springer, (2014)Thwarting Android app repackaging by executable code fragmentation., , , , , and . IJHPCN, 10 (4/5): 320-331 (2017)Compile-time code virtualization for android applications., , , , , , and . Comput. Secur., (2020)RISE: robust wireless sensing using probabilistic and statistical assessments., , , , , and . MobiCom, page 309-322. ACM, (2021)Towards wide-area contactless human sensing: poster abstract., , , , , , , , , and . SenSys, page 442-443. ACM, (2019)Cracking Android Pattern Lock in Five Attempts., , , , , , and . NDSS, The Internet Society, (2017)SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation., , , , , , , , and . TrustCom/BigDataSE/ICESS, page 261-268. IEEE Computer Society, (2017)