Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Symbolic Execution Techniques., , , , and . CoRR, (2016)Where Did My Variable Go? Poking Holes in Incomplete Debug Information., , , and . ASPLOS (2), page 935-947. ACM, (2023)Fuzzing Binaries for Memory Safety Errors with QASan., , and . SecDev, page 23-30. IEEE, (2020)Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method., , , and . DIMVA, volume 14828 of Lecture Notes in Computer Science, page 150-173. Springer, (2024)Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection., , and . ASE, page 183:1-183:5. ACM, (2022)Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation., , and . DSN, page 555-568. IEEE, (2021)Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution., , , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 121-140. Springer, (2019)The ROP needle: hiding trigger-based injection vectors via code reuse., , , and . SAC, page 1962-1970. ACM, (2019)Mining hot calling contexts in small space., , and . PLDI, page 516-527. ACM, (2011)Rope: Covert Multi-process Malware Execution with Return-Oriented Programming., , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 197-217. Springer, (2021)