From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PiOS: Detecting Privacy Leaks in iOS Applications., , , и . NDSS, The Internet Society, (2011)Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis., , , , , , и . NDSS, The Internet Society, (2017)Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications., , , , и . NDSS, The Internet Society, (2014)EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework., , , , , , и . NDSS, The Internet Society, (2015)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , и . USENIX Security Symposium, стр. 1239-1256. USENIX Association, (2022)Regulator: Dynamic Analysis to Detect ReDoS., , , , и . USENIX Security Symposium, стр. 4219-4235. USENIX Association, (2022)A Parallel Architecture for Stateful, High-Speed Intrusion Detection., , , , и . ICISS, том 5352 из Lecture Notes in Computer Science, стр. 203-220. Springer, (2008)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , и 1 other автор(ы). RAID, стр. 135-150. USENIX Association, (2019)Towards Detecting Compromised Accounts on Social Networks., , , и . CoRR, (2015)CLAPP: characterizing loops in Android applications., , , , и . ESEC/SIGSOFT FSE, стр. 687-697. ACM, (2015)