Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts., , , , , , , and . USENIX Security Symposium, page 1793-1810. USENIX Association, (2023)SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros., , , , and . SP, page 1066-1081. IEEE, (2022)GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts., , , , , and . NDSS, The Internet Society, (2024)Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market., , , , , and . CoRR, (2023)Understanding Security Issues in the NFT Ecosystem., , , , and . (December 2022)Jazzy: Leveraging Virtual Reality Layers for Hand-Eye Coordination in Users with Amblyopia., , , and . CHI Extended Abstracts, ACM, (2018)SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning., , , , , , , , and . RAID, page 456-468. ACM, (2021)