Author of the publication

Automated Identification of Flaky Builds using Knowledge Graphs.

, , , and . EKAW (Companion), volume 3256 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Half-Blind Attacks: Mask ROM Bootloaders are Dangerous., and . WOOT, page 1-6. USENIX Association, (2009)Finding Software Bugs in Embedded Devices., , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)BEERR: Bench of Embedded system Experiments for Reproducible Research., , and . EuroS&P Workshops, page 332-339. IEEE, (2022)Symbolic execution with SymCC: Don't interpret, compile!, and . USENIX Security Symposium, page 181-198. USENIX Association, (2020)Understanding and Detecting International Revenue Share Fraud., and . NDSS, The Internet Society, (2021)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , and 1 other author(s). RAID, page 135-150. USENIX Association, (2019)ESPwn32: Hacking with ESP32 System-on-Chips., , and . SP (Workshops), page 311-325. IEEE, (2023)SymQEMU: Compilation-based symbolic execution for binaries., and . NDSS, The Internet Society, (2021)SoK: Enabling Security Analyses of Embedded Systems via Rehosting., , , , , , , , , and 2 other author(s). AsiaCCS, page 687-701. ACM, (2021)Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 358-401 (2020)