Author of the publication

The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.

, , and . USENIX Security Symposium, page 6647-6664. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Practical Impact of DNSSEC Deployment., , , and . USENIX Security Symposium, page 573-588. USENIX Association, (2013)Do you know where your cloud files are?, , and . CCSW, page 73-82. ACM, (2011)Aggregate and Verifiably Encrypted Signatures from Bilinear Maps., , , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 416-432. Springer, (2003)Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model).. Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 61-79. Springer, (2018)Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)., , , , , , , and . CoRR, (2020)Welcome to the Entropics: Boot-Time Entropy in Embedded Devices., , , , and . IEEE Symposium on Security and Privacy, page 589-603. IEEE Computer Society, (2013)Gobi: WebAssembly as a Practical Path to Library Sandboxing., , , , and . CoRR, (2019)You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems., , , and . EVT, USENIX Association, (2008)Retrofitting Fine Grain Isolation in the Firefox Renderer., , , , , , , and . USENIX Security Symposium, page 699-716. USENIX Association, (2020)Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86., , , , , and . USENIX Security Symposium, page 679-697. USENIX Association, (2022)