Author of the publication

Vetting SSL Usage in Applications with SSLINT.

, , , , , , and . IEEE Symposium on Security and Privacy, page 519-534. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alcatraz: An Isolated Environment for Experimenting with Untrusted Software., , , and . ACM Trans. Inf. Syst. Secur., 12 (3): 14:1-14:37 (2009)SELF: a transparent security extension for ELF binaries., , and . NSPW, page 29-38. ACM, (2003)SWIPE: eager erasure of sensitive data in large scale systems software., , , , and . CODASPY, page 295-306. ACM, (2012)TamperProof: a server-agnostic defense for parameter tampering attacks on web applications., , , , and . CODASPY, page 129-140. ACM, (2013)Java Stack Inspection: Eager evaluation Revisited, , , and . Department of Computer Science, SUNY StonyBrook, (2001)Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures., , , , and . IEEE Access, (2020)PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification., , and . EURASIP J. Inf. Secur., (2014)Digital Check Forgery Attacks on Client Check Truncation Systems., , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 3-20. Springer, (2014)XMC: A Logic-Programming-Based Verification Toolset., , , , , , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 576-580. Springer, (2000)CMV: automatic verification of complete mediation for java virtual machines., , , and . AsiaCCS, page 100-111. ACM, (2008)