Author of the publication

Exploit in Smart Devices: A Case Study.

, , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 152-164. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Methodology of Inhibiting COVID-19 Spread on a University Campus., , , , , and . IVUS, volume 2915 of CEUR Workshop Proceedings, page 64-73. CEUR-WS.org, (2021)Binary Code Similarity Detection.. CoRR, (2023)SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs., , , , , , , , and . CoRR, (2023)Working Mechanism of Eternalblue and Its Application in Ransomworm., , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 178-191. Springer, (2022)WinkFuzz: Model-based Script Synthesis for Fuzzing., , , , and . ASSS@AsiaCCS, page 2:1-2:12. ACM, (2023)The Role of Boundary Conditions on Convergence Properties of Peridynamic Model for Transient Heat Transfer., , , , , and . J. Sci. Comput., 87 (2): 50 (2021)Exploit in Smart Devices: A Case Study., , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 152-164. Springer, (2019)Automated Binary Analysis: A Survey., , , , and . ICA3PP, volume 13777 of Lecture Notes in Computer Science, page 392-411. Springer, (2022)Binary Code Similarity Detection.. ASE, page 1056-1060. IEEE, (2021)Working mechanism of Eternalblue and its application in ransomworm.. CoRR, (2021)