Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels., , , , , , , , and . CCS, page 794-810. ACM, (2021)JACO: JAva Code Layout Optimizer Enabling Continuous Optimization without Pausing Application Services., , , , , , , , , and . CLUSTER, page 295-306. IEEE, (2023)How ChatGPT is Solving Vulnerability Management Problem., , , , , , , , , and . CoRR, (2023)Understanding the Security Risks of Docker Hub., , , , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 257-276. Springer, (2020)How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices., , , , , , , and . SP, page 3365-3381. IEEE, (2023)Prudent Practices for Designing Virtual Desktop Experiments., , , and . SEKE, page 404-517. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware., , , , , , , , , and . ASE, page 805-816. IEEE, (2021)Exploring ChatGPT's Capabilities on Vulnerability Management., , , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)