Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities., , and . USENIX Security Symposium, page 1043-1060. USENIX Association, (2022)Columbus: Android App Testing Through Systematic Callback Exploration., , , , , , , , and . ICSE, page 1381-1392. IEEE, (2023)HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images., , , , , , and . SP, page 1082-1099. IEEE, (2022)eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts., , , and . CCS, page 621-640. ACM, (2020)ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning., , , , , and . USENIX Security Symposium, USENIX Association, (2024)HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving., , and . EuroS&P, page 47-62. IEEE, (2016)Remote Keylogging Attacks in Multi-user VR Applications., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)A Semantic Framework for the Security Analysis of Ethereum Smart Contracts., , and . POST, volume 10804 of Lecture Notes in Computer Science, page 243-269. Springer, (2018)Foundations and Tools for the Static Analysis of Ethereum Smart Contracts., , and . CAV (1), volume 10981 of Lecture Notes in Computer Science, page 51-78. Springer, (2018)