From post

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.

, , , и . USENIX Security Symposium, USENIX Association, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions., , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 859-876. Springer, (2012)Expanding Malware Defense by Securing Software Installations., , , и . DIMVA, том 5137 из Lecture Notes in Computer Science, стр. 164-185. Springer, (2008)Scrutinizing Implementations of Smart Home Integrations., , , , , , и . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Automated Identification of Sensitive Data via Flexible User Requirements., и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 151-171. Springer, (2018)Golden implementation driven software debugging., , , и . SIGSOFT FSE, стр. 177-186. ACM, (2010)Identifying privacy weaknesses from multi-party trigger-action integration platforms., , , , , , , и . ISSTA, стр. 2-15. ACM, (2021)Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis., , , , и . NDSS, The Internet Society, (2012)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 245-256. Springer, (2014)Fuzzing Program Logic Deeply Hidden in Binary Program Stages., , , , и . SANER, стр. 105-116. IEEE, (2019)A Light-Weight Software Environment for Confining Android Malware., , , , и . SERE (Companion), стр. 158-167. IEEE, (2014)