Author of the publication

Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks.

, , and . ISSRE Workshops, page 237-242. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring., , , and . Autom. Softw. Eng., 31 (1): 1 (June 2024)Contract Usage and Evolution in Android Mobile Applications., , and . CoRR, (2024)Open and Interactive Learning Resources for Algorithmic Problem Solving., and . FM Workshops (2), volume 12233 of Lecture Notes in Computer Science, page 200-208. Springer, (2019)Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study., , , and . CoRR, (2023)bGSL: An imperative language for specification and refinement of backtracking programs., , , , , and . J. Log. Algebraic Methods Program., (2023)SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts., , , and . ASE, page 2102-2105. IEEE, (2023)Recounting the Rationals: Twice!., and . MPC, volume 5133 of Lecture Notes in Computer Science, page 79-91. Springer, (2008)Hoogle⋆: Constants and λ-abstractions in Petri-net-based Synthesis using Symbolic Execution., , and . ECOOP, volume 263 of LIPIcs, page 4:1-4:28. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Deadline Analysis of AUTOSAR OS Periodic Tasks in the Presence of Interrupts., , , , and . ICFEM, volume 8144 of Lecture Notes in Computer Science, page 165-181. Springer, (2013)Empirical Review of Automated Analysis Tools on 47, 587 Ethereum Smart Contracts., , , and . CoRR, (2019)