Author of the publication

MalGene: Automatic Extraction of Malware Analysis Evasion Signature.

, and . ACM Conference on Computer and Communications Security, page 769-780. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Mobile Code Languages., , , and . Mobile Object Systems, volume 1222 of Lecture Notes in Computer Science, page 93-110. Springer, (1996)Sleak: automating address space layout derandomization., , , , , and . ACSAC, page 190-202. ACM, (2019)Static Disassembly and Code Analysis.. Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Automating Mimicry Attacks Using Static Binary Analysis., , , , and . USENIX Security Symposium, USENIX Association, (2005)ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities., , , , and . USENIX Security Symposium, page 737-752. USENIX Association, (2015)Static Enforcement of Web Application Integrity Through Strong Typing., and . USENIX Security Symposium, page 283-298. USENIX Association, (2009)Towards Detecting Compromised Accounts on Social Networks., , , and . IEEE Trans. Dependable Secur. Comput., 14 (4): 447-460 (2017)VENOMAVE: Clean-Label Poisoning Against Speech Recognition., , , , , , and . CoRR, (2020)MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense., , , , , , and . ACM Conference on Computer and Communications Security, page 1714-1730. ACM, (2018)Street Rep: A Privacy-Preserving Reputation Aggregation System., , , , , , and . IACR Cryptol. ePrint Arch., (2023)