From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework to Eliminate Backdoors from Response-Computable Authentication., , , , , , и . IEEE Symposium on Security and Privacy, стр. 3-17. IEEE Computer Society, (2012)Scanning of real-world web applications for parameter tampering vulnerabilities., , , и . AsiaCCS, стр. 341-352. ACM, (2014)iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications., , , , , , , и . USENIX Security Symposium, стр. 2415-2432. USENIX Association, (2020)From Zygote to Morula: Fortifying Weakened ASLR on Android., , , , и . IEEE Symposium on Security and Privacy, стр. 424-439. IEEE Computer Society, (2014)IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time., , , , и . ESORICS, том 6345 из Lecture Notes in Computer Science, стр. 71-86. Springer, (2010)Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks., , , , и . ACSAC, стр. 327-336. ACM, (2010)Secure dynamic code generation against spraying., , , и . ACM Conference on Computer and Communications Security, стр. 738-740. ACM, (2010)Exploitations of Uninitialized Uses on macOS Sierra., , , и . WOOT, USENIX Association, (2017)