Author of the publication

SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications.

, , , and . SP, page 1100-1119. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cache Refinement Type for Side-Channel Detection of Cryptographic Software., , , , and . CCS, page 1583-1597. ACM, (2022)Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation., , , , , and . USENIX Security Symposium, page 657-674. USENIX Association, (2019)A Methodology for Invariants, Framing, and Subtyping in JML., and . Principled Software Development, page 19-39. Springer, (2018)Bounded Model Checking for LLVM., , , , , and . FMCAD, page 214-224. IEEE, (2022)Conditional effects in fine-grained region logic., , and . FTfJP@ECOOP, page 5:1-5:6. ACM, (2015)Unifying separation logic and region logic to allow interoperability., , and . Formal Aspects Comput., 30 (3-4): 381-441 (2018)Verifying Verified Code., , , , , and . ATVA, volume 12971 of Lecture Notes in Computer Science, page 187-202. Springer, (2021)SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications., , , and . SP, page 1100-1119. IEEE, (2022)HACCLE: metaprogramming for secure multi-party computation., , , , , , , , , and 10 other author(s). GPCE, page 130-143. ACM, (2021)Escape with Your Self: Expressive Reachability Types with Sound and Decidable Bidirectional Type Checking., , , , , and . CoRR, (2024)