Author of the publication

RAZOR: A Framework for Post-deployment Software Debloating.

, , , , , and . USENIX Security Symposium, page 1733-1750. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)Using artificial anomalies to detect unknown and known network intrusions., , , , and . Knowl. Inf. Syst., 6 (5): 507-527 (2004)Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process., , , , , , , , and . CoRR, (2023)Heterogeneous networking: a new survivability paradigm., , , , and . NSPW, page 33-39. ACM, (2001)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)