From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis., , и . USENIX Security Symposium, стр. 1153-1168. USENIX Association, (2016)OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary., , , , , , , и . SP, стр. 813-832. IEEE, (2021)Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++., , , , , и . CoRR, (2023)Poirot: Probabilistically Recommending Protections for the Android Framework., , и . CCS, стр. 937-950. ACM, (2022)Precise Android API Protection Mapping Derivation and Reasoning., , , , и . CCS, стр. 1151-1164. ACM, (2018)Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References., , , , , , , , и . CCS, стр. 1248-1259. ACM, (2015)Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing., , , , , и . USENIX Security Symposium, стр. 2759-2776. USENIX Association, (2021)Finding client-side business flow tampering vulnerabilities., , , , , , и . ICSE, стр. 222-233. ACM, (2020)PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning., , , , , , , и . SP, стр. 1121-1138. IEEE, (2020)DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android., , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 86-103. Springer, (2013)