Author of the publication

EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.

, , , , , , , and . ASPLOS, page 846-858. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications., , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 349-369. Springer, (2018)Demystifying Illegal Mobile Gambling Apps., , , , , and . WWW, page 1447-1458. ACM / IW3C2, (2021)As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service., , , , , and . NDSS, The Internet Society, (2021)Tracking Counterfeit Cryptocurrency End-to-end., , , , , , and . SIGMETRICS (Abstracts), page 33-34. ACM, (2021)On a New Class of Pulsing Denial-of-Service Attacks and the Defense., and . NDSS, The Internet Society, (2005)HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows., , , , , and . NDSS, The Internet Society, (2011)Demystifying the underground ecosystem of account registration bots., , , , , and . ESEC/SIGSOFT FSE, page 897-909. ACM, (2022)A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 167-184. Springer, (2019)PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation., , , , , , and . ISSTA, page 404-416. ACM, (2022)APER: Evolution-Aware Runtime Permission Misuse Detection for Android Apps., , , , , , and . ICSE, page 125-137. ACM, (2022)