Author of the publication

GPU-Disasm: A GPU-Based X86 Disassembler.

, , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 472-489. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution., and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices., and . CoRR, (2018)A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 322-336. Springer, (2011)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , and . NDSS, The Internet Society, (2015)Paranoid Android: versatile protection for smartphones., , , and . ACSAC, page 347-356. ACM, (2010)Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access., , and . CoRR, (2018)Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation., , and . EuroSys, page 15-27. ACM, (2006)Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure., , , , , , , and . EuroS&P, page 227-242. IEEE, (2018)Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries., , , , , , and . CoRR, (2021)Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses., , and . MobiSys, page 475-487. ACM, (2017)