Author of the publication

DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.

, and . USENIX Security Symposium, page 569-584. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building an Application-aware IPsec Policy System., and . USENIX Security Symposium, USENIX Association, (2005)Automatic evaluation of resonance and articulation disorders in cleft palate speech., , , , , and . ChinaSIP, page 358-362. IEEE, (2015)Thwarting E-mail Spam Laundering., , and . ACM Trans. Inf. Syst. Secur., 12 (2): 13:1-13:32 (2008)Building an application-aware IPsec policy system., and . IEEE/ACM Trans. Netw., 15 (6): 1502-1513 (2007)Keychain-Based Signatures for Securing BGP., , , and . IEEE J. Sel. Areas Commun., 28 (8): 1308-1318 (2010)Automatic detection of consonant omission in cleft palate speech., , , , , and . Int. J. Speech Technol., 22 (1): 59-65 (2019)Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform., , , , , , and . ISSTA, page 248-258. ACM, (2014)SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis., , , , , , , and . USENIX Security Symposium, page 2531-2548. USENIX Association, (2022)FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation., , , , , and . USENIX Security Symposium, page 1099-1114. USENIX Association, (2019)Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing., , and . NDSS, The Internet Society, (2021)