Author of the publication

ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.

, , , , and . AsiaCCS, page 11-22. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments., , , and . FEAST@CCS, page 65-70. ACM, (2017)Debloating Software through Piece-Wise Compilation and Loading., , and . USENIX Security Symposium, page 869-886. USENIX Association, (2018)Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks., , , and . SEED, page 176-188. IEEE, (2021)MACE: high-coverage and robust memory analysis for commodity operating systems., , , and . ACSAC, page 196-205. ACM, (2014)DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries., and . AsiaCCS, page 28-40. ACM, (2019)A Security Analysis of Labeling-Based Control-Flow Integrity Schemes., , , and . HiPCW, page 47-52. IEEE, (2022)Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform., , , , , , and . ISSTA, page 248-258. ACM, (2014)Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture., , , , , , , , , and . SP, page 2974-2989. IEEE, (2023)Supplementing Modern Software Defenses with Stack-Pointer Sanity., , and . ACSAC, page 116-127. ACM, (2017)Simplex: Repurposing Intel Memory Protection Extensions for Information Hiding., and . CoRR, (2020)