Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends., , , , , and . USENIX Security Symposium, page 551-566. USENIX Association, (2019)Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries., , , , , , , and . NDSS, The Internet Society, (2019)Virtual routing tables polymerization for lookup and update., , , , , , , and . ICNP, page 1-2. IEEE Computer Society, (2012)Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages., , , , , and . NDSS, The Internet Society, (2021)TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks., , , , , , , and . SP, page 1156-1171. IEEE, (2020)Cloaker Catcher: A Client-based Cloaking Detection System., , and . CoRR, (2017)Identifying Open-Source License Violation and 1-day Security Risk at Large Scale., , , , and . CCS, page 2169-2185. ACM, (2017)An ultra-fast universal incremental update algorithm for trie-based routing lookup., , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Towards practical use of Bloom Filter based IP lookup in operational network., , , , and . NOMS, page 1-4. IEEE, (2014)