Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency., , , , , , and . IEEE Access, (2022)Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks., , , , and . RAID, page 380-394. ACM, (2022)Building stack traces from memory dump of Windows x64., , , , and . Digit. Investig., (2018)ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets., , , , , , and . IEICE Trans. Inf. Syst., 103-D (7): 1476-1492 (2020)My script engines know what you did in the dark: converting engines into script API tracers., , , , , and . ACSAC, page 466-477. ACM, (2019)EIGER: automated IOC generation for accurate and interpretable endpoint malware detection., , , , , , and . ACSAC, page 687-701. ACM, (2019)Toward the Analysis of Distributed Code Injection in Post-mortem Forensics., , , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 391-409. Springer, (2019)Stealth Loader: Trace-free Program Loading for Analysis Evasion., , , , and . J. Inf. Process., (2018)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 217-237. Springer, (2017)