Author of the publication

On Leveraging Coding Habits for Effective Binary Authorship Attribution.

, , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 26-47. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Design Patterns: Survey and Evaluation., , , and . CCECE, page 1605-1608. IEEE, (2006)BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices., , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 114-138. Springer, (2018)Detection of Microgrid Cyberattacks Using Network and System Management., , , , , , and . IEEE Trans. Smart Grid, 14 (3): 2390-2405 (May 2023)A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities., , , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 815-832. Springer, (2009)Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)., , , , and . QSIC, page 97-102. IEEE Computer Society, (2008)On Leveraging Coding Habits for Effective Binary Authorship Attribution., , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 26-47. Springer, (2018)BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables., , , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 341-355. Springer, (2017)Towards Automation of Testing High-Level Security Properties., , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 268-282. Springer, (2008)AOP Extension for Security Testing of Programs., , , and . CCECE, page 647-650. IEEE, (2006)Team Edit Automata for Testing Security Property., , and . IAS, page 235-240. IEEE Computer Society, (2007)