Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ANDRUBIS - 1, 000, 000 Apps Later: A View on Current Android Malware Behaviors., , , , , and . BADGERS@ESORICS, page 3-17. IEEE, (2014)Lobotomy: An Architecture for JIT Spraying Mitigation., , , and . ARES, page 50-58. IEEE Computer Society, (2014)SMoTherSpectre: Exploiting Speculative Execution through Port Contention., , , , , , and . ACM Conference on Computer and Communications Security, page 785-800. ACM, (2019)Reconciling Security and Functional Requirements in Multi-tenant Clouds., , , and . SCC@AsiaCCS, page 11-18. ACM, (2017)The BORG: Nanoprobing Binaries for Buffer Overreads., , , and . CODASPY, page 87-97. ACM, (2015)FORECAST: skimming off the malware cream., , , and . ACSAC, page 11-20. ACM, (2011)Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations., , , and . USENIX Security Symposium, page 49-64. USENIX Association, (2013)MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis., , and . COMPSAC, page 422-433. IEEE Computer Society, (2015)Two methods for exploiting speculative control flow hijacks., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Look Ma, no constants: practical constant blinding in GraalVM., , and . EuroSec@EUROSYS, page 36-42. ACM, (2022)