Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware., , , and . MobiSys, page 205-218. ACM, (2023)G2Auth: secure mutual authentication for drone delivery without special user-side hardware., , , and . MobiSys, page 84-98. ACM, (2022)Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (6): 2582-2600 (2021)Validating the Contextual Information of Outdoor Images for Photo Misuse Detection., , , , , and . CoRR, (2018)Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification.. SANER, page 435-446. IEEE, (2020)Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation., , , , , , , , , and . IEEE Trans. Mob. Comput., 19 (12): 2946-2964 (2020)Unsupervised Binary Code Translation with Application to Code Clone Detection and Vulnerability Discovery., and . EMNLP (Findings), page 14581-14592. Association for Computational Linguistics, (2023)Unsupervised Binary Code Translation with Application to Code Similarity Detection and Vulnerability Discovery., and . CoRR, (2024)Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs., , , , , and . NDSS, The Internet Society, (2019)