From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ΔBreakpad: Diversified Binary Crash Reporting., , , , и . CoRR, (2017)Protecting Your Software Updates., , и . IEEE Secur. Priv., 11 (2): 47-54 (2013)Steganography for Executables and Code Transformation Signatures., , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 425-439. Springer, (2004)Attack simulation based software protection assessment method., , , , , , и . Cyber Security And Protection Of Digital Services, стр. 1-8. IEEE, (2016)Formal virtualization requirements for the ARM architecture., , , , и . J. Syst. Archit., 59 (3): 144-154 (2013)Sifting out the mud: low level C++ code reuse., , и . OOPSLA, стр. 275-291. ACM, (2002)SIGPLAN Notices 37(11).Software Protection Through Dynamic Code Mutation., , , , , и . WISA, том 3786 из Lecture Notes in Computer Science, стр. 194-206. Springer, (2005)LANCET: a nifty code editing tool., , , , , , и . PASTE, стр. 75-81. ACM, (2005)Software piracy prevention through diversity., , и . Digital Rights Management Workshop, стр. 63-71. ACM, (2004)Hybrid static-dynamic attacks against software protection mechanisms., , , и . Digital Rights Management Workshop, стр. 75-82. ACM, (2005)