Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier., , , , , and . IEEE Secur. Priv., 12 (1): 83-87 (2014)More ties than we thought., , , and . CoRR, (2014)Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation., , , , and . login Usenix Mag., (2011)The Halting Problems of Network Stack Insecurity., , , and . login Usenix Mag., (2011)Curing the Vulnerable Parser: Design Patterns for Secure Input Handling., , , , , , and . login Usenix Mag., (2017)Input Handling Done Right: Building Hardened Parsers Using Language-Theoretic Security., , , and . SecDev, page 4-5. IEEE Computer Society, (2017)Security Applications of Formal Language Theory., , , and . IEEE Syst. J., 7 (3): 489-500 (2013)PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 289-303. Springer, (2010)More ties than we thought., , , , and . PeerJ Comput. Sci., (2015)The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them., , , and . SecDev, page 45-52. IEEE Computer Society, (2016)