Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Better Pay Attention Whilst Fuzzing., , , , , , and . CoRR, (2021)HODOR: Shrinking Attack Surface on Node.js via System Call Limitation., , , , , , and . CCS, page 2800-2814. ACM, (2023)JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code., , , , and . CCS, page 1137-1150. ACM, (2018)An ABI-based Classification Approach for Ethereum Smart Contracts., , and . DASC/PiCom/CBDCom/CyberSciTech, page 99-104. IEEE, (2021)DBAF: Dynamic Binary Analysis Framework and Its Applications., , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 361-375. Springer, (2018)V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing., , , , , , , , and . CCS, page 2197-2213. ACM, (2021)GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts., , , and . CoRR, (2023)APICraft: Fuzz Driver Generation for Closed-source SDK Libraries., , , , , , , , and . USENIX Security Symposium, page 2811-2828. USENIX Association, (2021)When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?, , , , , , , , and . CoRR, (2023)DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities., , , , , , , and . ASE, page 1664-1675. IEEE, (2023)