Author of the publication

Automatic Heap Layout Manipulation for Exploitation.

, , and . USENIX Security Symposium, page 763-779. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal CHERI-C Semantics for Verification., , and . TACAS (1), volume 13993 of Lecture Notes in Computer Science, page 549-568. Springer, (2023)Automatic Heap Layout Manipulation for Exploitation., , and . USENIX Security Symposium, page 763-779. USENIX Association, (2018)End-to-End Formal Verification of a RISC-V Processor Extended with Capability Pointers., and . FMCAD, page 24-33. IEEE, (2021)Equivalence Checking Using Trace Partitioning., , , and . ISVLSI, page 13-18. IEEE Computer Society, (2015)DeepSynth: Automata Synthesis for Automatic Task Segmentation in Deep Reinforcement Learning., , , , and . AAAI, page 7647-7656. AAAI Press, (2021)Generating Realistic Unrestricted Adversarial Inputs using Dual-Objective GAN Training., , and . CoRR, (2019)Verification of the Tree-Based Hierarchical Read-Copy Update in the Linux Kernel., , , and . CoRR, (2016)Active Learning of Abstract System Models from Traces using Model Checking., , and . DATE, page 100-103. IEEE, (2022)Relational STE and theorem proving for formal verification of industrial circuit designs., , and . FMCAD, page 97-104. IEEE, (2013)Verification of tree-based hierarchical read-copy update in the Linux kernel., , , and . DATE, page 61-66. IEEE, (2018)