Author of the publication

JSForce: A Forced Execution Engine for Malicious JavaScript Detection.

, , , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 704-720. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JSForce: A Forced Execution Engine for Malicious JavaScript Detection., , , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 704-720. Springer, (2017)Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs., , , and . CCS, page 1105-1116. ACM, (2014)PC2: Pseudo-Classification Based Pseudo-Captioning for Noisy Correspondence Learning in Cross-Modal Retrieval., , , , , and . CoRR, (2024)Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications., , , , , , and . CCS, page 921-935. ACM, (2022)Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains., , and . USENIX Security Symposium, page 1829-1846. USENIX Association, (2023)DC-SSL: Addressing Mismatched Class Distribution in Semi-supervised Learning., , , , , and . CVPR, page 9747-9755. IEEE, (2022)Marco: A Stochastic Asynchronous Concolic Explorer., , and . ICSE, page 59:1-59:12. ACM, (2024)Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing., , , and . NDSS, The Internet Society, (2019)Disassembling Obfuscated Executables with LLM., , , , , , and . CoRR, (2024)Automatic Reputation Computation through Document Analysis: A Social Network Approach., , , , , , and . ASONAM, page 559-560. IEEE Computer Society, (2011)