From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A source-to-source transformation tool for error fixing., , и . CASCON, стр. 147-160. IBM / ACM, (2013)An Adversarial Evaluation of Network Signaling and Control Mechanisms., , , и . ICISC, том 6829 из Lecture Notes in Computer Science, стр. 252-265. Springer, (2010)Automatic runtime error repair and containment via recovery shepherding., , и . PLDI, стр. 227-238. ACM, (2014)Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement., , , , , , и . ASPLOS, стр. 473-486. ACM, (2015)Missing the Point(er): On the Effectiveness of Code Pointer Integrity., , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 781-796. IEEE Computer Society, (2015)Sound input filter generation for integer overflow errors., , , и . POPL, стр. 439-452. ACM, (2014)Principled Sampling for Anomaly Detection., , , , и . NDSS, The Internet Society, (2015)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , и . ACM Conference on Computer and Communications Security, стр. 901-913. ACM, (2015)AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks., , , , , и . DIMVA, том 9721 из Lecture Notes in Computer Science, стр. 37-57. Springer, (2016)Program fracture and recombination for efficient automatic code reuse., , , и . HPEC, стр. 1-6. IEEE, (2015)