Author of the publication

An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.

, , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps., and . CoRR, (2021)Static analysis of android apps: A systematic literature review., , , , , , , and . Inf. Softw. Technol., (2017)An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities., , , and . CoRR, (2022)Security Aspects of Cryptocurrency Wallets - A Systematic Literature Review., , and . ACM Comput. Surv., 56 (1): 4:1-4:31 (January 2024)Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities., , , , and . QRS, page 586-597. IEEE, (2021)ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware., , , , , , and . CODASPY, page 25-36. ACM, (2019)RAICC: Revealing Atypical Inter-Component Communication in Android Apps., , , and . ICSE, page 1398-1409. IEEE, (2021)Model Driven Mutation Applied to Adaptative Systems Testing., , , , , and . ICST Workshops, page 408-413. IEEE Computer Society, (2011)On The (In)Effectiveness of Static Logic Bomb Detection for Android Apps., and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3822-3836 (2022)Musti: Dynamic Prevention of Invalid Object Initialization Attacks., , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2167-2178 (2019)