Author of the publication

Automated Security Debugging Using Program Structural Constraints.

, , , and . ACSAC, page 453-462. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Code Dissemination in Wireless Sensor Networks., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)SEER: practical memory virus scanning as a service., , , , and . ACSAC, page 186-195. ACM, (2014)Detecting repackaged smartphone applications in third-party android marketplaces., , , and . CODASPY, page 317-326. ACM, (2012)Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks., , and . WISEC, page 2-12. ACM, (2008)On the Expressiveness of Return-into-libc Attacks., , , , , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 121-141. Springer, (2011)Attack-resistant location estimation in sensor networks., , and . IPSN, page 99-106. IEEE, (2005)Analyzing Intensive Intrusion Alerts via Correlation., , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 74-94. Springer, (2002)Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part I: Single-Hop Networks., , and . GLOBECOM, page 1-6. IEEE, (2011)MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis., , , and . USENIX Security Symposium, page 65-80. USENIX Association, (2013)DACSA: A Decoupled Architecture for Cloud Security Analysis., , , , and . CSET, USENIX Association, (2014)