Author of the publication

X-Force: Force-Executing Binary Programs for Security Applications.

, , , , , and . USENIX Security Symposium, page 829-844. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seamless User-Level Handoff in Ubiquitous Multimedia Service Delivery., , and . Multim. Tools Appl., 22 (2): 137-170 (2004)vPipe: One Pipe to Connect Them All!, , and . HotCloud, USENIX Association, (2013)ProFactory: Improving IoT Security via Formalized Protocol Customization., , , , , , and . USENIX Security Symposium, page 3879-3896. USENIX Association, (2022)M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles., , , , , and . USENIX Security Symposium, page 285-302. USENIX Association, (2021)PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles., , , , and . NDSS, The Internet Society, (2021)NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces., , , , and . NDSS, The Internet Society, (2021)BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy., , , , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2020)iFlow: Middleware-assisted Rendezvous-based Information Access for Mobile Ad Hoc Applications., , , and . MobiSys, page 71-84. USENIX, (2003)Guest-transparent instruction authentication for self-patching kernels., , , , and . MILCOM, page 1-6. IEEE, (2012)Improved kernel security through memory layout randomization., , and . IPCCC, page 1-10. IEEE Computer Society, (2013)