From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors., , , , , и . BADGERS@ESORICS, стр. 3-17. IEEE, (2014)Lobotomy: An Architecture for JIT Spraying Mitigation., , , и . ARES, стр. 50-58. IEEE Computer Society, (2014)SMoTherSpectre: Exploiting Speculative Execution through Port Contention., , , , , , и . ACM Conference on Computer and Communications Security, стр. 785-800. ACM, (2019)Reconciling Security and Functional Requirements in Multi-tenant Clouds., , , и . SCC@AsiaCCS, стр. 11-18. ACM, (2017)The BORG: Nanoprobing Binaries for Buffer Overreads., , , и . CODASPY, стр. 87-97. ACM, (2015)FORECAST: skimming off the malware cream., , , и . ACSAC, стр. 11-20. ACM, (2011)Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations., , , и . USENIX Security Symposium, стр. 49-64. USENIX Association, (2013)MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis., , и . COMPSAC, стр. 422-433. IEEE Computer Society, (2015)Look Ma, no constants: practical constant blinding in GraalVM., , и . EuroSec@EUROSYS, стр. 36-42. ACM, (2022)A Static, Packer-Agnostic Filter to Detect Similar Malware Samples., , , , и . DIMVA, том 7591 из Lecture Notes in Computer Science, стр. 102-122. Springer, (2012)