Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models., , , , , and . CoRR, (2023)CollabFuzz: A Framework for Collaborative Fuzzing., , , , , , , and . EuroSec@EuroSys, page 1-7. ACM, (2021)Safety, Liveness, and Information Flow: Dependability Revisited., , , , and . ARCS Workshops, volume P-81 of LNI, page 56-65. GI, (2006)AntiFuzz: Impeding Fuzzing Audits of Binary Executables., , , and . USENIX Security Symposium, page 1931-1947. USENIX Association, (2019)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2022)Loki: Hardening Code Obfuscation Against Automated Attacks., , , , , , and . USENIX Security Symposium, page 3055-3073. USENIX Association, (2022)No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning., , , , , and . USENIX Security Symposium, page 5109-5126. USENIX Association, (2023)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , and . USENIX Security Symposium, page 1985-2002. USENIX Association, (2019)NAUTILUS: Fishing for Deep Bugs with Grammars., , , , , and . NDSS, The Internet Society, (2019)On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways., and . NDSS, The Internet Society, (2020)