Author of the publication

Jetset: Targeted Firmware Rehosting for Embedded Systems.

, , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Got traffic?: an evaluation of click traffic providers., , , and . WebQuality@WWW, page 19-26. ACM, (2011)Web feature deprecation: a case study for chrome., , , , , and . ICSE (SEIP), page 302-311. IEEE / ACM, (2019)Judging a site by its content: learning the textual, structural, and visual features of malicious web pages., , and . AISec, page 1-10. ACM, (2011)Self-stopping worms., , and . WORM, page 12-21. ACM Press, (2005)Scalability, fidelity, and containment in the potemkin virtual honeyfarm., , , , , , , and . SOSP, page 148-162. ACM, (2005)Difference engine: harnessing memory redundancy in virtual machines., , , , , , , and . Commun. ACM, 53 (10): 85-93 (2010)Too LeJIT to Quit: Extending JIT Spraying to ARM., , and . NDSS, The Internet Society, (2015)Hopper: Modeling and Detecting Lateral Movement., , , , , , and . USENIX Security Symposium, page 3093-3110. USENIX Association, (2021)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , and . USENIX Security Symposium, page 1033-1050. USENIX Association, (2016)Jigsaw: solving the puzzle of enterprise 802.11 analysis., , , , , and . SIGCOMM, page 39-50. ACM, (2006)