Author of the publication

Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities., , , and . USENIX Security Symposium, page 197-214. USENIX Association, (2022)RICC: Robust Collective Classification of Sybil Accounts., , and . WWW, page 2329-2339. ACM, (2023)AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking., and . CCS, page 3505-3518. ACM, (2023)FUSE: Finding File Upload Bugs via Penetration Testing., , , and . NDSS, The Internet Society, (2020)AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads., , , , , and . USENIX Security Symposium, page 2543-2560. USENIX Association, (2021)Pharewell to Phishing., , , and . SSS, volume 5340 of Lecture Notes in Computer Science, page 233-245. Springer, (2008)Diglossia: detecting code injection attacks with precision and efficiency., , and . ACM Conference on Computer and Communications Security, page 1181-1192. ACM, (2013)Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications., , , , and . ACM Conference on Computer and Communications Security, page 1731-1746. ACM, (2018)Targeted Model Inversion: Distilling style encoded in predictions., , , and . Comput. Secur., (2024)Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning., , and . WWW, page 743-754. ACM, (2022)