Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SplitScreen: Enabling efficient, distributed malware detection., , , , , and . J. Commun. Networks, 13 (2): 187-200 (2011)Grey-box concolic testing on binary code., , , and . ICSE, page 736-747. IEEE / ACM, (2019)INDAGO: A New Framework For Detecting Malicious SDN Applications., , , and . ICNP, page 220-230. IEEE Computer Society, (2018)BotScreen: Trust Everybody, but Cut the Aimbots Yourself., , and . USENIX Security Symposium, page 481-498. USENIX Association, (2023)Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned., , , , and . CoRR, (2020)Mind control attack: Undermining deep learning with GPU memory exploitation., , , , and . Comput. Secur., (2021)Automatic exploit generation., , , , , and . Commun. ACM, 57 (2): 74-84 (2014)SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses., , , , , and . ASE, page 227-239. IEEE, (2021)On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-Box Fuzzers., , , and . APSEC, page 11-20. IEEE, (2023)Evaluating Directed Fuzzers: Are We Heading in the Right Direction?, , , , and . Proc. ACM Softw. Eng., 1 (FSE): 316-337 (2024)