From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Binary Analysis Approach to Retrofit Security in Input Parsing Routines., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 306-322. IEEE Computer Society, (2018)Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel., , , , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 276-298. Springer, (2014)Mechanical Phish: Resilient Autonomous Hacking., , , , , , , , , и 4 other автор(ы). IEEE Secur. Priv., 16 (2): 12-22 (2018)Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware., , , , и . NDSS, The Internet Society, (2015)BootStomp: On the Security of Bootloaders in Mobile Devices., , , , , , , , и . USENIX Security Symposium, стр. 781-798. USENIX Association, (2017)Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service., , , , , , , , , и . USENIX Security Symposium, стр. 4169-4186. USENIX Association, (2021)Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers., , , , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)ViK: practical mitigation of temporal memory safety violations through object ID inspection., , , , , , , и . ASPLOS, стр. 271-284. ACM, (2022)Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits., , , и . IEEE Symposium on Security and Privacy, стр. 824-839. IEEE Computer Society, (2017)Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale., , , , , , , , , и . SP, стр. 2566-2583. IEEE, (2023)