From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding Substitutable Binary Code By Synthesizing Adapters., , и . IEEE Trans. Software Eng., 47 (8): 1626-1643 (2021)Emulating emulation-resistant malware., , , , и . VMSec@CCS, стр. 11-22. ACM, (2009)PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring., , , и . SEED, стр. 25-36. IEEE, (2022)Java Ranger at SV-COMP 2020 (Competition Contribution)., , , , и . TACAS (2), том 12079 из Lecture Notes in Computer Science, стр. 393-397. Springer, (2020)Counterexample-Guided Inductive Repair of Reactive Contracts., , , , и . FormaliSE@ICSE, стр. 46-57. ACM, (2022)Java Ranger: Supporting String and Array Operations in Java Ranger (Competition Contribution)., , , , и . TACAS (2), том 13994 из Lecture Notes in Computer Science, стр. 553-558. Springer, (2023)First Time Miss : Low Overhead Mitigation for Shared Memory Cache Side Channels., , , и . ICPP, стр. 36:1-36:11. ACM, (2020)Contract discovery from black-box components., , , , и . WASPI@ESEC/SIGSOFT FSE, стр. 5-8. ACM, (2018)Java Ranger: statically summarizing regions for efficient symbolic execution of Java., , , , и . ESEC/SIGSOFT FSE, стр. 123-134. ACM, (2020)Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison., , , и . NDSS, The Internet Society, (2020)