From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How ChatGPT is Solving Vulnerability Management Problem., , , , , , , , , и . CoRR, (2023)Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs., , , , и . CCS, стр. 3253-3267. ACM, (2022)Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection., , , и . NDSS, The Internet Society, (2022)EMS: History-Driven Mutation for Coverage-based Fuzzing., , , , , , и . NDSS, The Internet Society, (2022)ACTOR: Action-Guided Kernel Fuzzing., , , , , , , и . USENIX Security Symposium, стр. 5003-5020. USENIX Association, (2023)UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers., , , , , , , , , и 2 other автор(ы). USENIX Security Symposium, стр. 2777-2794. USENIX Association, (2021)Guiding Directed Fuzzing with Feasibility., , , и . EuroS&P Workshops, стр. 42-49. IEEE, (2023)Understanding the Security Risks of Docker Hub., , , , , , , , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 257-276. Springer, (2020)GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity., , , и . NDSS, The Internet Society, (2024)Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow., , , , , , , и . ESORICS (3), том 14984 из Lecture Notes in Computer Science, стр. 194-214. Springer, (2024)