From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring Abstraction Functions in Fuzzing., , , , , и . CNS, стр. 1-9. IEEE, (2020)Challenges in cybersecurity: Lessons from biological defense systems., , , , , , , , , и 12 other автор(ы). CoRR, (2021)Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment., , , , и . GameSec, том 13727 из Lecture Notes in Computer Science, стр. 87-106. Springer, (2022)Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability., , , , , , и . USENIX Security Symposium, стр. 71-88. USENIX Association, (2022)Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation., , , , , , , , , и 4 other автор(ы). USENIX Security Symposium, стр. 5791-5808. USENIX Association, (2023)HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems., , , , , , и . CCS, стр. 279-291. ACM, (2020)SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture., , , , , , и . MobiSys, стр. 107-120. ACM, (2020)Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities., , , , , , , , , и . SP, стр. 2658-2675. IEEE, (2023)Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone., , , , , , , и . ACSAC, стр. 441-452. ACM, (2018)CacheLight: Defeating the CacheKit Attack., , , , и . ASHES@CCS, стр. 65-74. ACM, (2018)