From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Type and Memory Safety Violation Detection Mechanisms. Purdue University, USA, (2020)TypeSan: Practical Type Confusion Detection., , , , , , и . ACM Conference on Computer and Communications Security, стр. 517-528. ACM, (2016)SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms., , , и . SP, стр. 1808-1825. IEEE, (2022)FuZZan: Efficient Sanitizer Metadata Design for Fuzzing., , , и . USENIX ATC, стр. 249-263. USENIX Association, (2020)PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications., , , , , , и . CODASPY, стр. 209-220. ACM, (2019)A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery., , , и . SEGS@CCS, стр. 35-40. ACM, (2013)Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique., , , , и . USENIX Security Symposium, стр. 6825-6842. USENIX Association, (2023)Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem., , , и . ICICS (1), том 12918 из Lecture Notes in Computer Science, стр. 59-77. Springer, (2021)LT-OLSR: Attack-tolerant OLSR against link spoofing., , , и . LCN, стр. 216-219. IEEE Computer Society, (2012)HexType: Efficient Detection of Type Confusion Errors for C++., , , , и . CCS, стр. 2373-2387. ACM, (2017)