Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SpellBound: Defending Against Package Typosquatting., , , , and . CoRR, (2020)Automatic Generation of Remediation Procedures for Malware Infections., , , , , , and . USENIX Security Symposium, page 419-434. USENIX Association, (2010)Identity Armour: User Controlled Browser Security., and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 474-480. Springer, (2020)(Nothing But) Many Eyes Make All Bugs Shallow., , and . SCORED@CCS, page 53-63. ACM, (2023)Well Played: Interpreting Prince of Persia: The Sands of Time.. Games Cult., 3 (3-4): 356-386 (2008)Wolf at the Door: Preventing Install-Time Attacks in npm with Latch., , , and . AsiaCCS, page 1139-1153. ACM, (2022)What the Fork? Finding Hidden Code Clones in npm., , and . ICSE, page 2415-2426. ACM, (2022)Cimplifier: automatically debloating containers., , , , and . ESEC/SIGSOFT FSE, page 476-486. ACM, (2017)MisMesh: Security Issues and Challenges in Service Meshes., , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 140-151. Springer, (2020)Parcae: A Blockchain-Based PRF Service for Everyone., and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 328-341. Springer, (2021)