Author of the publication

SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.

, , , , , , , , , , , , and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 229-249. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Classification Based Framework to Predict Viral Threads., , , , , , , and . PACIS, page 134. (2015)Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms., , , , , and . ASONAM, page 464-469. ACM, (2019)Trimmer: Context-Specific Code Reduction., , , , and . ASE, page 168:1-168:5. ACM, (2022)A Service Architecture for Countering Distributed Denial of Service Attacks., and . AINA Workshops (1), page 36-42. IEEE Computer Society, (2007)Covert channels in online rogue-like games., and . ICC, page 761-767. IEEE, (2014)Accelerating Fourier and Number Theoretic Transforms using Tensor Cores and Warp Shuffles., , , , , , , and . PACT, page 345-355. IEEE, (2021)Poster Abstract: Guardian - A Smart Cloud Fabric for Virtual Patching and Customized Defenses., , , , and . INFOCOM Workshops, page 1043-1044. IEEE, (2019)Optimized Rollback and Re-computation., , , , , and . HICSS, page 4930-4937. IEEE Computer Society, (2013)Accurate Detection of Automatically Spun Content via Stylometric Analysis., , , , , and . ICDM, page 425-434. IEEE Computer Society, (2017)Paranoid: A Global Secure File Access Control System., , and . ACSAC, page 322-332. IEEE Computer Society, (2005)