From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding Software Bugs in Embedded Devices., , и . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)Half-Blind Attacks: Mask ROM Bootloaders are Dangerous., и . WOOT, стр. 1-6. USENIX Association, (2009)BEERR: Bench of Embedded system Experiments for Reproducible Research., , и . EuroS&P Workshops, стр. 332-339. IEEE, (2022)Understanding and Detecting International Revenue Share Fraud., и . NDSS, The Internet Society, (2021)Symbolic execution with SymCC: Don't interpret, compile!, и . USENIX Security Symposium, стр. 181-198. USENIX Association, (2020)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , и 1 other автор(ы). RAID, стр. 135-150. USENIX Association, (2019)SoK: Enabling Security Analyses of Embedded Systems via Rehosting., , , , , , , , , и 2 other автор(ы). AsiaCCS, стр. 687-701. ACM, (2021)ESPwn32: Hacking with ESP32 System-on-Chips., , и . SP (Workshops), стр. 311-325. IEEE, (2023)SymQEMU: Compilation-based symbolic execution for binaries., и . NDSS, The Internet Society, (2021)HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing., и . DSN, стр. 294-305. IEEE, (2020)