Author of the publication

A Framework for Dynamic Taint Analysis of Binary Executable File.

, and . ICISA, page 1-2. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS., , , and . ICCSA (1), volume 7971 of Lecture Notes in Computer Science, page 382-395. Springer, (2013)Multi-contact model for FEM-based surgical simulation., , and . Medical Imaging: Image-Guided Procedures, volume 7625 of SPIE Proceedings, page 76252H. SPIE, (2010)Row-by-Row Dynamic Source-Line Voltage Control (RRDSV) Scheme for Two Orders of Magnitude Leakage Current Reduction of Sub-1-V-VDD SRAM's., , , , , , , , , and . IEICE Trans. Electron., 88-C (4): 760-767 (2005)Empirical performance evaluation of IETF mobile IPv6 and proxy mobile IPv6., , , and . Mobility Conference, page 68. ACM, (2008)Establishing Usability and Development Strategies: Focused on Intelligent Legislation Support System., , , , and . iThings/CPSCom, page 541-545. IEEE Computer Society, (2011)A Framework for Dynamic Taint Analysis of Binary Executable File., and . ICISA, page 1-2. IEEE, (2013)Sequential Change-Point Detection Methods for Nonstationary Time Series., , and . Technometrics, 50 (1): 40-52 (2008)A Framework of Static Analyzer for Taint Analysis of Binary Executable File., , , , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 185-192. Springer, (2013)Enhanced Light Weight Route Optimization in Proxy Mobile IPv6., and . NCM, page 501-504. IEEE Computer Society, (2009)Dynamic binary analyzer for scanning vulnerabilities with taint analysis., , , and . Multimedia Tools Appl., 74 (7): 2301-2320 (2015)