From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)., , , , и . Financial Cryptography (1), том 12674 из Lecture Notes in Computer Science, стр. 117-146. Springer, (2021)BootKeeper: Validating Software Integrity Properties on Boot Firmware Images., , , , , , , , и . CODASPY, стр. 315-325. ACM, (2019)Revolver: An Automated Approach to the Detection of Evasive Web-based Malware., , , , и . USENIX Security Symposium, стр. 637-652. USENIX Association, (2013)Ten Years of iCTF: The Good, The Bad, and The Ugly., , , , , , , и . 3GSE, USENIX Association, (2014)Ramblr: Making Reassembly Great Again., , , , , , , и . NDSS, The Internet Society, (2017)AIM-SDN: Attacking Information Mismanagement in SDN-datastores., , , , и . CCS, стр. 664-676. ACM, (2018)Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling., , , , , , и . ACSAC, стр. 278-288. ACM, (2018)How the ELF Ruined Christmas., , , , и . USENIX Security Symposium, стр. 643-658. USENIX Association, (2015)DOJO: Applied Cybersecurity Education in the Browser., и . SIGCSE (1), стр. 930-936. ACM, (2024)The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study., , , и . AsiaCCS, стр. 602-615. ACM, (2022)