Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NS3: Neuro-symbolic Semantic Code Search., , , , , and . NeurIPS, (2022)BootKeeper: Validating Software Integrity Properties on Boot Firmware Images., , , , , , , , and . CODASPY, page 315-325. ACM, (2019)PERFUME: Programmatic Extraction and Refinement for Usability of Mathematical Expression., , , , , and . Checkmate@CCS, page 59-69. ACM, (2021)Fine-grained Coverage-based Fuzzing., , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (5): 138:1-138:41 (June 2024)Intrusion detection in distributed systems, an approach based on taint marking., , , and . ICC, page 1962-1967. IEEE, (2013)Modeling Cognitive Workload in Open-Source Communities via Simulation., , , , and . MABS, volume 14558 of Lecture Notes in Computer Science, page 146-159. Springer, (2023)Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 413-430. USENIX Association, (2022)Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications., , , , , , and . RAID, page 744-758. ACM, (2023)Information Flow Control for Intrusion Detection Derived from MAC Policy., , , and . ICC, page 1-6. IEEE, (2011)SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 138-157. IEEE Computer Society, (2016)