Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SplitScreen: Enabling efficient, distributed malware detection., , , , , and . J. Commun. Networks, 13 (2): 187-200 (2011)BotScreen: Trust Everybody, but Cut the Aimbots Yourself., , and . USENIX Security Symposium, page 481-498. USENIX Association, (2023)Grey-box concolic testing on binary code., , , and . ICSE, page 736-747. IEEE / ACM, (2019)INDAGO: A New Framework For Detecting Malicious SDN Applications., , , and . ICNP, page 220-230. IEEE Computer Society, (2018)AlertVision: Visualizing Security Alerts., , , , , and . WISA, volume 11402 of Lecture Notes in Computer Science, page 173-184. Springer, (2018)Scheduling black-box mutational fuzzing., , , and . ACM Conference on Computer and Communications Security, page 511-522. ACM, (2013)Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)Reassembly is Hard: A Reflection on Challenges and Strategies., , , , and . USENIX Security Symposium, page 1469-1486. USENIX Association, (2023)CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines., , and . NDSS, The Internet Society, (2019)RETracer: triaging crashes by reverse execution from partial memory dumps., , , , and . ICSE, page 820-831. ACM, (2016)