Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Drive-By Download Attacks: Challenges and Open Problems., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 52-62. Springer, (2009)A solution for the automated detection of clickjacking attacks., , , , and . AsiaCCS, page 135-144. ACM, (2010)Evocatio: Conjuring Bug Capabilities from a Single PoC., , , , , , , , and . CCS, page 1599-1613. ACM, (2022)RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation., , , , and . ASE, page 128-138. IEEE, (2019)A Cautionary Tale About Detecting Malware Using Hardware Performance Counters and Machine Learning., , , , and . IEEE Des. Test, 38 (3): 39-50 (2021)Organizing Large Scale Hacking Competitions., , , , , , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 132-152. Springer, (2010)High-performance low-energy implementation of cryptographic algorithms on a programmable SoC for IoT devices., , and . HPEC, page 1-6. IEEE, (2017)Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists., , and . USENIX Security Symposium, page 2881-2898. USENIX Association, (2021)On the Perils of Leaking Referrers in Online Collaboration Services., , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 67-85. Springer, (2019)MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys., , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 136-155. Springer, (2022)