Author of the publication

On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.

, , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 557-570 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments., , , and . FEAST@CCS, page 65-70. ACM, (2017)Debloating Software through Piece-Wise Compilation and Loading., , and . USENIX Security Symposium, page 869-886. USENIX Association, (2018)Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks., , , and . SEED, page 176-188. IEEE, (2021)MACE: high-coverage and robust memory analysis for commodity operating systems., , , and . ACSAC, page 196-205. ACM, (2014)DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries., and . AsiaCCS, page 28-40. ACM, (2019)Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform., , , , , , and . ISSTA, page 248-258. ACM, (2014)A Security Analysis of Labeling-Based Control-Flow Integrity Schemes., , , and . HiPCW, page 47-52. IEEE, (2022)Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture., , , , , , , , , and . SP, page 2974-2989. IEEE, (2023)Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis., , , , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 254-276. Springer, (2016)Defeating ROP Through Denial of Stack Pivot., and . ACSAC, page 111-120. ACM, (2015)