Author of the publication

A Software Environment for Confining Malicious Android Applications via Resource Virtualization.

, , , and . ICECCS, page 208-211. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thwarting E-mail Spam Laundering., , and . ACM Trans. Inf. Syst. Secur., 12 (2): 13:1-13:32 (2008)PalmTree: Learning an Assembly Language Model for Instruction Embedding., , and . CoRR, (2021)Building an application-aware IPsec policy system., and . IEEE/ACM Trans. Netw., 15 (6): 1502-1513 (2007)Automatic detection of consonant omission in cleft palate speech., , , , , and . Int. J. Speech Technol., 22 (1): 59-65 (2019)Keychain-Based Signatures for Securing BGP., , , and . IEEE J. Sel. Areas Commun., 28 (8): 1308-1318 (2010)Building an Application-aware IPsec Policy System., and . USENIX Security Symposium, USENIX Association, (2005)Automatic evaluation of resonance and articulation disorders in cleft palate speech., , , , , and . ChinaSIP, page 358-362. IEEE, (2015)Automatic Malware Analysis - An Emulator Based Approach., and . Springer Briefs in Computer Science Springer, (2013)FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation., , , , , and . USENIX Security Symposium, page 1099-1114. USENIX Association, (2019)SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis., , , , , , , and . USENIX Security Symposium, page 2531-2548. USENIX Association, (2022)