From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation, , , , и . #SEC07#, (2007)Automatic exploit generation., , , , , и . Commun. ACM, 57 (2): 74-84 (2014)Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software., , и . NDSS, The Internet Society, (2006)Contractual Anonymity., , и . NDSS, The Internet Society, (2010)Tachyon: Tandem Execution for Efficient Live Patch Testing., и . USENIX Security Symposium, стр. 617-630. USENIX Association, (2012)BYTEWEIGHT: Learning to Recognize Functions in Binary Code., , , , и . USENIX Security Symposium, стр. 845-860. USENIX Association, (2014)Optimizing Seed Selection for Fuzzing., , , , , , и . USENIX Security Symposium, стр. 861-875. USENIX Association, (2014)Enhancing symbolic execution with veritesting., , , и . ICSE, стр. 1083-1094. ACM, (2014)SplitScreen: Enabling Efficient, Distributed Malware Detection., , , , , и . NSDI, стр. 377-390. USENIX Association, (2010)Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation., , , и . USENIX Security Symposium, USENIX Association, (2007)