Author of the publication

Xede: Practical Exploit Early Detection.

, , , , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 198-221. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Xede: Practical Exploit Early Detection., , , , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 198-221. Springer, (2015)Large-scale Security Measurements on the Android Firmware Ecosystem., , , , , , , , , and . ICSE, page 1257-1268. ACM, (2022)VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 122-139. Springer, (2013)Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem., , , , , , , , , and 1 other author(s). IEEE Trans. Software Eng., 49 (7): 3901-3921 (July 2023)