Author of the publication

Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation.

, , and . DSN, page 555-568. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Symbolic Execution Techniques., , , , and . CoRR, (2016)Where Did My Variable Go? Poking Holes in Incomplete Debug Information., , , and . ASPLOS (2), page 935-947. ACM, (2023)Fuzzing Binaries for Memory Safety Errors with QASan., , and . SecDev, page 23-30. IEEE, (2020)Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method., , , and . DIMVA, volume 14828 of Lecture Notes in Computer Science, page 150-173. Springer, (2024)On-Stack Replacement à la Carte., and . CoRR, (2017)New techniques for adaptive program optimization.. Sapienza University of Rome, Italy, (2017)base-search.net (ftunivromairis:oai:iris.uniroma1.it:11573/876041).The Use of Likely Invariants as Feedback for Fuzzers., , and . USENIX Security Symposium, page 2829-2846. USENIX Association, (2021)On-stack replacement, distilled., and . PLDI, page 166-180. ACM, (2018)SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)., , , , and . AsiaCCS, page 15-27. ACM, (2019)Assisting Malware Analysis with Symbolic Execution: A Case Study., , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 171-188. Springer, (2017)