Author of the publication

From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel.

, , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using HPSG to represent multi-modal grammar in multi-modal dialogue., , and . INTERSPEECH, page 735-738. ISCA, (2000)Spare Instance: an Adaptive Mechanism for Managing Cluster Applications., , and . CLUSTER, page 1-2. IEEE Computer Society, (2005)Automated Vulnerability Detection in Embedded Devices., , , , and . IFIP Int. Conf. Digital Forensics, volume 532 of IFIP Advances in Information and Communication Technology, page 313-329. Springer, (2018)Office message center - a spoken dialogue system., , , , , , and . INTERSPEECH, page 704-706. ISCA, (2000)Adaptive Management of a Utility Computing., , , , and . CLUSTER, page 1-2. IEEE Computer Society, (2005)Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework., , , , , , and . TrustCom/BigDataSE, page 705-712. IEEE, (2018)VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search., , , , , , , and . NDSS, The Internet Society, (2023)Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)INSTILLER: Towards Efficient and Realistic RTL Fuzzing., , , , , and . CoRR, (2024)