Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds., , , , , and . CoRR, (2021)Demystifying NFT Promotion and Phishing Scams., , , , , and . CoRR, (2023)Constant Size Ring Signature Without Random Oracle., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 230-247. Springer, (2015)Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts., , , , , , , and . USENIX Security Symposium, page 1793-1810. USENIX Association, (2023)Hybrid Pruning: Towards Precise Pointer and Taint Analysis., , , , , , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 1-22. Springer, (2022)Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market., , , , , and . CoRR, (2023)Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds., , and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 468-499. Springer, (2018)Understanding Security Issues in the NFT Ecosystem., , , , and . CCS, page 667-681. ACM, (2022)ACTOR: Action-Guided Kernel Fuzzing., , , , , , , and . USENIX Security Symposium, page 5003-5020. USENIX Association, (2023)SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds., , , , , and . SP, page 161-178. IEEE, (2022)