Author of the publication

SQLR: Grammar-Guided Validation of SQL Injection Sanitizers.

, , , and . ICECCS, page 154-157. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expanding Malware Defense by Securing Software Installations., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 164-185. Springer, (2008)Scrutinizing Implementations of Smart Home Integrations., , , , , , and . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Automated Identification of Sensitive Data via Flexible User Requirements., and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 151-171. Springer, (2018)Automatically Identifying Trigger-based Behavior in Malware, , , , , and . chapter 4, page 65-88. Springer US, (2008)Immunizing Servers from Buffer-Overflow Attacks, , and . Adaptive and Resilient Computing Security Workshop, (November 2004)A Usage-Pattern Perspective for Privacy Ranking of Android Apps., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 245-256. Springer, (2014)Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis., , , , and . NDSS, The Internet Society, (2012)Golden implementation driven software debugging., , , and . SIGSOFT FSE, page 177-186. ACM, (2010)Identifying privacy weaknesses from multi-party trigger-action integration platforms., , , , , , , and . ISSTA, page 2-15. ACM, (2021)Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions., , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 859-876. Springer, (2012)