Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Binary Representation for Automatic Patch Detection., , , , , , , , , and . CCNC, page 1-6. IEEE, (2019)PeX: A Permission Check Analysis Framework for Linux Kernel., , , , , and . USENIX Security Symposium, page 1205-1220. USENIX Association, (2019)KALD: Detecting Direct Pointer Disclosure Vulnerabilities., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1369-1377 (2021)Automatic Permission Check Analysis for Linux Kernel., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1849-1866 (May 2023)EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning., , , , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2015)HIMA: A Hypervisor-Based Integrity Measurement Agent., , , and . ACSAC, page 461-470. IEEE Computer Society, (2009)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)SEER: practical memory virus scanning as a service., , , , and . ACSAC, page 186-195. ACM, (2014)SKEE: A lightweight Secure Kernel-level Execution Environment for ARM., , , , , , and . NDSS, The Internet Society, (2016)DACSA: A Decoupled Architecture for Cloud Security Analysis., , , , and . CSET, USENIX Association, (2014)