Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Pruning: Towards Precise Pointer and Taint Analysis., , , , , , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 1-22. Springer, (2022)Demystifying NFT Promotion and Phishing Scams., , , , , and . CoRR, (2023)SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds., , , , , and . CoRR, (2021)Constant Size Ring Signature Without Random Oracle., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 230-247. Springer, (2015)Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts., , , , , , , and . USENIX Security Symposium, page 1793-1810. USENIX Association, (2023)Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds., , and . EUROCRYPT (1), volume 10820 of Lecture Notes in Computer Science, page 468-499. Springer, (2018)ACTOR: Action-Guided Kernel Fuzzing., , , , , , , and . USENIX Security Symposium, page 5003-5020. USENIX Association, (2023)Exploiting Unfair Advantages: Investigating Opportunistic Trading in the NFT Market., , , , , and . CoRR, (2023)Understanding Security Issues in the NFT Ecosystem., , , , and . CCS, page 667-681. ACM, (2022)SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds., , , , , and . SP, page 161-178. IEEE, (2022)