Author of the publication

Identifying Dormant Functionality in Malware Programs.

, , , , , and . IEEE Symposium on Security and Privacy, page 61-76. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functional Programming for Distributed Systems with XC (Artifact)., , , , and . Dagstuhl Artifacts Ser., 8 (2): 08:1-08:4 (2022)Programming Languages for Distributed Systems (NII Shonan Meeting 149)., , , and . NII Shonan Meet. Rep., (2019)An Analysis of Language-Level Support for Self-Adaptive Software., , and . ACM Trans. Auton. Adapt. Syst., 8 (2): 7:1-7:29 (2013)A fault-tolerant programming model for distributed interactive applications., , , and . Proc. ACM Program. Lang., 3 (OOPSLA): 144:1-144:29 (2019)Context-oriented programming: A software engineering perspective., , and . J. Syst. Softw., 85 (8): 1801-1817 (2012)Programming with Implicit Flows., , and . IEEE Softw., 31 (5): 52-59 (2014)Bridging Between Active Objects: Multitier Programming for Distributed, Concurrent Systems., and . Active Object Languages: Current Research Trends, volume 14360 of Lecture Notes in Computer Science, Springer, (2024)Enclave-Based Secure Programming with JE., , , and . SecDev, page 71-78. IEEE, (2021)CPL: A Core Language for Cloud Computing - Technical Report., , , and . CoRR, (2016)Change Is the Only Constant: Dynamic Updates for Workflows., , and . ICSE, page 350-362. ACM, (2022)