Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Avgerinos, Thanassis
add a person with the name Avgerinos, Thanassis
 

Other publications of authors with the same name

Automatic exploit generation., , , , , and . Commun. ACM, 57 (2): 74-84 (2014)Cleaning up Erlang code is a dirty job but somebody's gotta do it., and . Erlang Workshop, page 1-10. ACM, (2009)Enhancing symbolic execution with veritesting., , , and . Commun. ACM, 59 (6): 93-100 (2016)Automatic refactoring of Erlang programs., and . PPDP, page 13-24. ACM, (2009)BAP: A Binary Analysis Platform., , , and . CAV, volume 6806 of Lecture Notes in Computer Science, page 463-469. Springer, (2011)The Mayhem Cyber Reasoning System., , , , , , and . IEEE Secur. Priv., 16 (2): 52-60 (2018)Q: Exploit Hardening Made Easy., , and . USENIX Security Symposium, USENIX Association, (2011)TIE: Principled Reverse Engineering of Types in Binary Programs., , and . NDSS, The Internet Society, (2011)AEG: Automatic Exploit Generation., , , and . NDSS, The Internet Society, (2011)Unleashing Mayhem on Binary Code., , , and . IEEE Symposium on Security and Privacy, page 380-394. IEEE Computer Society, (2012)