Author of the publication

The Case of the Poisoned Event Handler: Weaknesses in the Node.js Event-Driven Architecture.

, , and . EUROSEC, page 8:1-8:6. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking Regex engines to address ReDoS.. ESEC/SIGSOFT FSE, page 1256-1258. ACM, (2019)Reflecting on Recurring Failures in IoT Development., and . ASE, page 185:1-185:5. ACM, (2022)Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies., , , , and . SP, page 1238-1255. IEEE, (2023)The IceProd Framework: Distributed Data Processing for the IceCube Neutrino Observatory., , , , , , , , , and 277 other author(s). CoRR, (2013)Towards Rehosting Embedded Applications as Linux Applications., , , , and . DSN-S, page 94-99. IEEE, (2023)A Partial Replication of MaskFormer in TensorFlow on TPUs for the TensorFlow Model Garden., , , and . CoRR, (2024)An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry., , , , , , , and . ICSE, page 2463-2475. IEEE, (2023)Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliability., , , , , and . ESEC/SIGSOFT FSE, page 1605-1609. ACM, (2022)Pruning One More Token is Enough: Leveraging Latency-Workload Non-Linearities for Vision Transformers on the Edge., , , , , and . CoRR, (2024)PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software., , , , , , , , and . MSR, page 431-443. ACM, (2024)