Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-Assisted Processor Tracing for Automated Bug Finding and Exploit Prevention.. Georgia Institute of Technology, Atlanta, GA, USA, (2022)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/67192).PUMM: Preventing Use-After-Free Using Execution Unit Partitioning., , , and . USENIX Security Symposium, page 823-840. USENIX Association, (2023)VulChecker: Graph-based Vulnerability Localization in Source Code., , , , , , , and . USENIX Security Symposium, page 6557-6574. USENIX Association, (2023)Modeling Large-Scale Manipulation in Open Stock Markets., , , , , and . IEEE Secur. Priv., 19 (6): 58-65 (2021)Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating., , , and . RAID, page 17-31. ACM, (2023)Cryptographic Key Derivation from Biometric Inferences for Remote Authentication., , , , and . AsiaCCS, page 629-643. ACM, (2021)Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook., and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 383-400. Springer, (2016)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems., , , , , and . USENIX Security Symposium, page 1989-2006. USENIX Association, (2021)Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis., , , and . CCS, page 320-336. ACM, (2021)