Author of the publication

Metrics for runtime detection of allocators in binaries.

, , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking a Complex Distributed Algorithm from Different Sides: An Experience with Complementary Validation Tools., , and . PSTV, page 3-17. North-Holland, (1984)Testing Mobile Agents., , and . TestCom, volume 210 of IFIP Conference Proceedings, page 95-110. Kluwer, (2002)Integration Testing of Distributed Components Based on Learning Parameterized I/O Models., , and . FORTE, volume 4229 of Lecture Notes in Computer Science, page 436-450. Springer, (2006)Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities., , , , and . RAID, page 47-62. USENIX Association, (2020)Using Estelle for Verification - An Experience with the T.70 Teletex Transport Protocol., and . FORTE, page 185-199. North-Holland, (1988)From Estelle Specifications to Industrial Test Suites, Using and Empirical Approach., and . FORTE, page 175-190. North-Holland, (1990)Attacking a Complex Distributed Algorithm from Different Sides: an Experience with Complementary Validation Tools., , and . Comput. Networks, (1986)Using Invariant Detection Mechanism in Black Box Inference., and . ISoLA, volume RNTI-SM-1 of Revue des Nouvelles Technologies de l'Information, page 215-222. Cépaduès-Éditions, (2007)Inferring Mealy Machines., and . FM, volume 5850 of Lecture Notes in Computer Science, page 207-222. Springer, (2009)Reducing Regression Test Suites using the Word2Vec Natural Language Processing Tool., , , , and . SEED/NLPaSE@APSEC, volume 2799 of CEUR Workshop Proceedings, page 43-53. CEUR-WS.org, (2020)