Author of the publication

DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform.

, , , , , and . IEEE Trans. Software Eng., 43 (2): 164-184 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending hardware based mandatory access controls for memory to multicore architectures., , and . CSIIRW, page 23:1-23:3. ACM, (2008)Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation., , , and . NDSS, The Internet Society, (2012)Foundations of memristor based PUF architectures., , , , and . NANOARCH, page 52-57. IEEE Computer Society, (2013)A write-time based memristive PUF for hardware security applications., , , and . ICCAD, page 830-833. IEEE, (2013)V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis., , , and . VEE, page 227-238. ACM, (2012)Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform., , , , , , and . ISSTA, page 248-258. ACM, (2014)A two-dimensional chaotic logic gate for improved computer security., , and . MWSCAS, page 1-4. IEEE, (2015)Debloating Software through Piece-Wise Compilation and Loading., , and . USENIX Security Symposium, page 869-886. USENIX Association, (2018)DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis., and . USENIX Security Symposium, page 569-584. USENIX Association, (2012)