Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems., , , , , , and . CNS, page 1-9. IEEE, (2020)Using Loops For Malware Classification Resilient to Feature-unaware Perturbations., , , , , , and . ACSAC, page 112-123. ACM, (2018)CLAPP: characterizing loops in Android applications., , , , and . ESEC/SIGSOFT FSE, page 687-697. ACM, (2015)Dynodroid: an input generation system for Android apps., , and . ESEC/SIGSOFT FSE, page 224-234. ACM, (2013)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , and 1 other author(s). RAID, page 135-150. USENIX Association, (2019)BootStomp: On the Security of Bootloaders in Mobile Devices., , , , , , , , and . USENIX Security Symposium, page 781-798. USENIX Association, (2017)CLAPP: characterizing loops in Android applications (invited talk)., , , , and . DeMobile@SIGSOFT FSE, page 33-34. ACM, (2015)Mechanical Phish: Resilient Autonomous Hacking., , , , , , , , , and 4 other author(s). IEEE Secur. Priv., 16 (2): 12-22 (2018)CheckedCBox: Type Directed Program Partitioning with Checked C for Incremental Spatial Memory Safety., , , , and . CoRR, (2023)An Empirical Study on the Use of Static Analysis Tools in Open Source Embedded Software., , , , and . CoRR, (2023)