Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries., , , , , , , and . NDSS, The Internet Society, (2019)Invited Tutorial: Counteracting Web Application Abuse in Malware., , , , , and . SecDev, page 1-2. IEEE, (2023)C3PO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration., , , , , , , and . CCS, page 3352-3365. ACM, (2021)PUMM: Preventing Use-After-Free Using Execution Unit Partitioning., , , and . USENIX Security Symposium, page 823-840. USENIX Association, (2023)vRead: Efficient Data Access for Hadoop in Virtualized Clouds., , , , and . Middleware, page 125-136. ACM, (2015)Toward a more dependable hybrid analysis of android malware using aspect-oriented programming., , , , and . Comput. Secur., (2018)Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages., , , , , and . NDSS, The Internet Society, (2021)Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware., , , , , and . USENIX Security Symposium, page 6115-6132. USENIX Association, (2023)TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks., , , , , , , and . SP, page 1156-1171. IEEE, (2020)Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants., and . CyCon, page 1-16. IEEE, (2011)