Author of the publication

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.

, , and . NDSS, The Internet Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binary Control-Flow Trimming., and . ACM Conference on Computer and Communications Security, page 1009-1022. ACM, (2019)FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation., and . ACM Conference on Computer and Communications Security, page 2149-2150. ACM, (2020)Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors., , and . DMS, page 257-260. Knowledge Systems Institute, (2010)CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs., , and . DATE, page 474-479. IEEE, (2019)Vigiles: Fine-Grained Access Control for MapReduce Systems., , , and . BigData Congress, page 40-47. IEEE Computer Society, (2014)Exploiting an antivirus interface., , , , and . Comput. Stand. Interfaces, 31 (6): 1182-1189 (2009)BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 505-517 (2021)Data Mining for Security Applications., , , and . EUC (2), page 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.Automated Threat Report Classification over Multi-Source Data., , , , and . CIC, page 236-245. IEEE Computer Society, (2018)Secure Semantic Sensor Web and Pervasive Computing., and . SUTC/UMC, page 5-10. IEEE Computer Society, (2010)