Author of the publication

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.

, , , and . USENIX Security Symposium, page 353-368. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic exploit generation., , , , , and . Commun. ACM, 57 (2): 74-84 (2014)Contractual Anonymity., , and . NDSS, The Internet Society, (2010)A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks., , , and . CCS, page 1789-1801. ACM, (2020)Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?, , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring., , , and . USENIX Security Symposium, page 353-368. USENIX Association, (2013)Q: Exploit Hardening Made Easy., , and . USENIX Security Symposium, USENIX Association, (2011)VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning., , , , , and . ICSE, page 2327-2339. ACM, (2022)How to model a TCP/IP network using only 20 parameters., , and . WSC, page 849-860. IEEE, (2010)Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code., , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 771-774. AAAI Press, (2018)Meaningful variable names for decompiled code: a machine translation approach., , , , and . ICPC, page 20-30. ACM, (2018)