Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code., , , , and . CCS, page 1137-1150. ACM, (2018)HODOR: Shrinking Attack Surface on Node.js via System Call Limitation., , , , , , and . CCS, page 2800-2814. ACM, (2023)Better Pay Attention Whilst Fuzzing., , , , , , and . CoRR, (2021)An ABI-based Classification Approach for Ethereum Smart Contracts., , and . DASC/PiCom/CBDCom/CyberSciTech, page 99-104. IEEE, (2021)Hyperion: Unveiling DApp Inconsistencies using LLM and Dataflow-Guided Symbolic Execution., , , , , , , and . CoRR, (2024)LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks., , , and . USENIX Security Symposium, USENIX Association, (2024)DBAF: Dynamic Binary Analysis Framework and Its Applications., , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 361-375. Springer, (2018)SmartOracle: Generating Smart Contract Oracle via Fine-Grained Invariant Detection., , , , , and . CoRR, (2024)Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities., , , , , , , and . ASE, page 1664-1675. IEEE, (2023)