Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection., , , , , , , and . Trans. Comput. Sci., (2009)Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks., , , , , , and . NOMS, page 121-128. IEEE, (2008)ExecRecorder: VM-based full-system replay for attack analysis and system recovery., , , , , and . ASID, page 66-71. ACM, (2006)The essence of command injection attacks in web applications., and . POPL, page 372-382. ACM, (2006)Validity Checking for Finite Automata over Linear Arithmetic Constraints., and . FSTTCS, volume 4337 of Lecture Notes in Computer Science, page 405-416. Springer, (2006)Static detection of cross-site scripting vulnerabilities., and . ICSE, page 171-180. ACM, (2008)Sound and precise analysis of web applications for injection vulnerabilities., and . PLDI, page 32-41. ACM, (2007)An Analysis Framework for Security in Web Applications, and . Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004), page 70--78. (2004)Static checking of dynamically generated queries in database applications., , , and . ACM Trans. Softw. Eng. Methodol., 16 (4): 14 (2007)Temporal search: detecting hidden malware timebombs with virtual machines., , , , , and . ASPLOS, page 25-36. ACM, (2006)