From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing., , , , и . CoRR, (2022)A System for the Security Protection of Embedded Binary Programs., , , , , , , и . DSN Workshops, стр. 234-237. IEEE Computer Society, (2016)Online control adaptation for safe and secure autonomous vehicle operations., , , , , , и . AHS, стр. 101-108. IEEE, (2017)Matryoshka: Strengthening Software Protection via Nested Virtual Machines., , и . SPRO@ICSE, стр. 10-16. IEEE Computer Society, (2015)Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge., , , , , , , , и . IEEE Secur. Priv., 16 (2): 42-51 (2018)Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing., , , , и . CCS, стр. 351-365. ACM, (2021)Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing., , , , и . USENIX Security Symposium, стр. 1683-1700. USENIX Association, (2021)Using program metadata to support SDT in object-oriented applications., , и . ICOOOLPS@ECOOP, стр. 55-62. ACM, (2009)Dynamic Canary Randomization for Improved Software Security., , и . CISRC, стр. 9:1-9:7. ACM, (2016)What's the PointiSA?, , и . IH&MMSec, стр. 23-34. ACM, (2014)