Author of the publication

Capturing Information Flow with Concatenated Dynamic Taint Analysis.

, , , and . ARES, page 355-362. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation., , , and . Sensors, 23 (6): 3000 (March 2023)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)Working Towards a Primary Binary Analysis System., , , , and . Security and Management, page 459-465. CSREA Press, (2010)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . CCS, page 131-145. ACM, (2018)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , and . SAINT, page 273-276. IEEE Computer Society, (2010)Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 41-60. Springer, (2016)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)A Heuristic-Based Feature Selection Method for Clustering Spam Emails., , , , and . ICONIP (1), volume 6443 of Lecture Notes in Computer Science, page 290-297. Springer, (2010)Provoked arrangement symptoms in obsessive-compulsive disorder using a virtual environment: A preliminary report., , , and . Comput. Biol. Medicine, 42 (4): 422-427 (2012)A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 291-301. Springer, (2006)