Author of the publication

Scholarly Digital Libraries as a Platform for Malware Distribution.

, , , , , , and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 107-128. IOS Press, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images., , , , , , , , and . CODASPY, page 315-325. ACM, (2019)System Call API Obfuscation (Extended Abstract)., , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 421-422. Springer, (2008)Hypervisor-based malware protection with AccessMiner., , , and . Comput. Secur., (2015)Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks., , , , and . USENIX Security Symposium, page 431-446. USENIX Association, (2016)Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data., , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 445-464. Springer, (2018)Measuring the Role of Greylisting and Nolisting in Fighting Spam., , , , and . DSN, page 562-571. IEEE Computer Society, (2016)Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks., , and . DIMVA, volume 4579 of Lecture Notes in Computer Science, page 213-230. Springer, (2007)LISABETH: automated content-based signature generator for zero-day polymorphic worms., , , and . SESS, page 41-48. ACM, (2008)Detecting (absent) app-to-app authentication on cross-device short-distance channels., , , and . ACSAC, page 328-338. ACM, (2019)Deja-Vu: A Glimpse on Radioactive Soft-Error Consequences on Classical and Quantum Computations., , and . CoRR, (2021)