Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing system-wide control flow integrity for exploit detection and diagnosis., , and . AsiaCCS, page 311-322. ACM, (2013)Polyglot: automatic extraction of protocol message format using dynamic binary analysis., , , and . CCS, page 317-329. ACM, (2007)Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation., , , , , and . CCS, page 66-77. ACM, (2014)DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis., , , and . CCS, page 606-618. ACM, (2018)Manipulating semantic values in kernel data structures: Attack assessments and implications., , , and . DSN, page 1-12. IEEE Computer Society, (2013)Game Theory with Probabilistic Prediction for Conflict Resolution in Air Traffic Management., , , and . ISKE, page 94-98. IEEE, (2015)Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers., , , , , and . CoRR, (2020)Emulating emulation-resistant malware., , , , and . VMSec@CCS, page 11-22. ACM, (2009)DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly., , , and . USENIX Security Symposium, page 2709-2725. USENIX Association, (2022)SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets., , , , , , and . NDSS, The Internet Society, (2021)