From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs., , , , , , , , , и 2 other автор(ы). USENIX Security Symposium, стр. 413-430. USENIX Association, (2022)Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases., , , , , , , , , и 1 other автор(ы). NDSS, The Internet Society, (2021)Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization., , , , , , и . NDSS, The Internet Society, (2020)MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts., , , , , , и . HICSS, стр. 1-10. ScholarSpace, (2021)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , и . CCS, стр. 3093-3107. ACM, (2023)Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation., , , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry., , , , , , , и . AsiaCCS, ACM, (2024)CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing., , , , , , , , , и 3 other автор(ы). SP, стр. 1109-1124. IEEE, (2021)Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)., , , , и . Financial Cryptography (1), том 12674 из Lecture Notes in Computer Science, стр. 117-146. Springer, (2021)TYGR: Type Inference on Stripped Binaries using Graph Neural Networks., , , , , , , , , и 4 other автор(ы). USENIX Security Symposium, USENIX Association, (2024)