From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey of Symbolic Execution Techniques., , , , и . CoRR, (2016)Where Did My Variable Go? Poking Holes in Incomplete Debug Information., , , и . ASPLOS (2), стр. 935-947. ACM, (2023)Fuzzing Binaries for Memory Safety Errors with QASan., , и . SecDev, стр. 23-30. IEEE, (2020)Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method., , , и . DIMVA, том 14828 из Lecture Notes in Computer Science, стр. 150-173. Springer, (2024)On-Stack Replacement à la Carte., и . CoRR, (2017)New techniques for adaptive program optimization.. Sapienza University of Rome, Italy, (2017)base-search.net (ftunivromairis:oai:iris.uniroma1.it:11573/876041).The Use of Likely Invariants as Feedback for Fuzzers., , и . USENIX Security Symposium, стр. 2829-2846. USENIX Association, (2021)On-stack replacement, distilled., и . PLDI, стр. 166-180. ACM, (2018)SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)., , , , и . AsiaCCS, стр. 15-27. ACM, (2019)Assisting Malware Analysis with Symbolic Execution: A Case Study., , , и . CSCML, том 10332 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2017)