From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CydiOS: A Model-Based Testing Framework for iOS Apps., , , , , , , и . ISSTA, стр. 1-13. ACM, (2023)Invisibility Cloak: Proactive Defense Against Visual Game Cheating., , , , и . USENIX Security Symposium, USENIX Association, (2024)RAZOR: A Framework for Post-deployment Software Debloating., , , , , и . USENIX Security Symposium, стр. 1733-1750. USENIX Association, (2019)On Tracking Information Flows through JNI in Android Applications., , , и . DSN, стр. 180-191. IEEE Computer Society, (2014)DeView: Confining Progressive Web Applications by Debloating Web APIs., , , , и . ACSAC, стр. 881-895. ACM, (2022)Enforcing Unique Code Target Property for Control-Flow Integrity., , , , , , и . CCS, стр. 1470-1486. ACM, (2018)Slimium: Debloating the Chromium Browser with Feature Subsetting., , , , и . CCS, стр. 461-476. ACM, (2020)Towards a scalable resource-driven approach for detecting repackaged Android applications., , , , и . ACSAC, стр. 56-65. ACM, (2014)Reducing Software's Attack surface with Code Debloating.. Georgia Institute of Technology, Atlanta, GA, USA, (2021)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/64787).Revisiting the Description-to-Behavior Fidelity in Android Applications., , , и . SANER, стр. 415-426. IEEE Computer Society, (2016)