Author of the publication

Runtime Analysis and Instrumentation for Securing Software.

. RV, volume 6418 of Lecture Notes in Computer Science, page 58. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building survivable systems: An integrated approach based on intrusion detection and confinement., , , , , and . Darpa Information Security Symposium, (2000)Efficient Techniques for Comprehensive Protection from Memory Error Exploits, , and . #SEC05#, (2005)Immunizing Servers from Buffer-Overflow Attacks, , and . Adaptive and Resilient Computing Security Workshop, (November 2004)On the Power and Limitations of Strictness Analysis based on Abstract Interpretation, , and . Journal of the ACM, (1997)A Fast Automaton-Based Approach for Detecting Anamolous Program Behaviors, , , and . #IEEE01#, (2001)Expanding Malware Defense by Securing Software Installations., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 164-185. Springer, (2008)SAFER: Efficient and Error-Tolerant Binary Instrumentation., , , and . USENIX Security Symposium, page 1451-1468. USENIX Association, (2023)A High-Performance Network Intrusion Detection System., , , and . CCS, page 8-17. ACM, (1999)Protection, usability and improvements in reflected XSS filters., and . AsiaCCS, page 5. ACM, (2012)A Conservative Technique to Improve Deterministic Evaluation of Logic Programs., , , and . ICCL, page 196-205. IEEE Computer Society, (1998)