Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)., , , and . ACSAC, page 177-189. ACM, (2019)FAST: Fast Acceleration of Symbolic Transition Systems., , , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 118-121. Springer, (2003)Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster)., , , and . CCS, page 2384-2386. ACM, (2021)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries., , , , , and . CCS, page 1690-1704. ACM, (2023)Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction., , , , , and . ICETE (Selected Papers), volume 1795 of Communications in Computer and Information Science, page 281-304. Springer, (2021)Bringing CP, SAT and SMT together: Next Challenges in Constraint Solving (Dagstuhl Seminar 19062)., , and . Dagstuhl Reports, 9 (2): 27-47 (2019)Specify and measure, cover and reveal: A unified framework for automated test generation., , , and . Sci. Comput. Program., (2021)Binary level toolchain provenance identification with graph neural networks., , and . SANER, page 131-141. IEEE, (2021)No Crash, No Exploit: Automated Verification of Embedded Kernels., , , and . CoRR, (2020)Automated Program Analysis: Revisiting Precondition Inference through Constraint Acquisition., , , and . IJCAI, page 1873-1879. ijcai.org, (2022)