Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Library Function Disposing Approach in Binary Translation., , , , and . J. Comput. Res. Dev., 43 (12): 2174-2179 (2006)Anna: A KVS for Any Scale., , , and . IEEE Trans. Knowl. Data Eng., 33 (2): 344-358 (2021)SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks., , , , , , , , and . CoRR, (2021)FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods., , , , , , , , and . CoRR, (2022)Making Information Hiding Effective Again., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2576-2594 (2022)CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation., , , , , , , and . CCS, page 2989-3002. ACM, (2022)Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths., , , , , , and . USENIX Security Symposium, page 4365-4382. USENIX Association, (2022)SysMon: Monitoring Memory Behaviors via OS Approach., , , , and . APPT, volume 10561 of Lecture Notes in Computer Science, page 51-63. Springer, (2017)HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines., , , , , , , and . VEE, page 53-64. ACM, (2015)ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks., , , , , , , , , and . ICSE (1), page 824-834. IEEE Computer Society, (2015)