Author of the publication

MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.

, , , and . USENIX Security Symposium, page 65-80. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis., , , and . USENIX Security Symposium, page 65-80. USENIX Association, (2013)SKEE: A lightweight Secure Kernel-level Execution Environment for ARM., , , , , , and . NDSS, The Internet Society, (2016)A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications., , , , and . EuroSys, page 31:1-31:14. ACM, (2019)PeX: A Permission Check Analysis Framework for Linux Kernel., , , , , and . USENIX Security Symposium, page 1205-1220. USENIX Association, (2019)Does "COVID" Search via Social Networking Sites Cause COVID-19 Fatality Growth?, and . ICIS, Association for Information Systems, (2020)SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android., , , , , , , and . AsiaCCS, page 612-624. ACM, (2017)Always up-to-date: scalable offline patching of VM images in a compute cloud., , , , , and . ACSAC, page 377-386. ACM, (2010)From Sentiment to Well-Being: Internet Users in an Uncertain and Risky Environment., , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 496-502. Springer, (2020)EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning., , , , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2015)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)