Author of the publication

Recognizing Functions in Binaries with Neural Networks.

, , and . USENIX Security Symposium, page 611-626. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)Robust Physical-World Attacks on Deep Learning Models, , , , , , , , and . (2017)cite arxiv:1707.08945Comment: Accepted to CVPR 2018.Parametrized Hierarchical Procedures for Neural Programming., , , , , and . ICLR (Poster), OpenReview.net, (2018)Execution-Guided Neural Program Synthesis., , and . ICLR (Poster), OpenReview.net, (2019)Understanding Mobile App Usage Patterns Using In-App Advertisements., , , and . PAM, volume 7799 of Lecture Notes in Computer Science, page 63-72. Springer, (2013)Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 161-181. Springer, (2009)Delving into adversarial attacks on deep policies., and . ICLR (Workshop), OpenReview.net, (2017)Differentiable Neural Network Architecture Search., , and . ICLR (Workshop), OpenReview.net, (2018)A Learning-Based Approach to Reactive Security., , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)Sanctorum: A lightweight security monitor for secure enclaves., , , , , , , and . DATE, page 1142-1147. IEEE, (2019)