Author of the publication

Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.

, , , , and . CCS, page 2169-2185. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends., , , , , and . USENIX Security Symposium, page 551-566. USENIX Association, (2019)Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries., , , , , , , and . NDSS, The Internet Society, (2019)Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages., , , , , and . NDSS, The Internet Society, (2021)TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks., , , , , , , and . SP, page 1156-1171. IEEE, (2020)Virtual routing tables polymerization for lookup and update., , , , , , , and . ICNP, page 1-2. IEEE Computer Society, (2012)An ultra-fast universal incremental update algorithm for trie-based routing lookup., , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Identifying Open-Source License Violation and 1-day Security Risk at Large Scale., , , , and . CCS, page 2169-2185. ACM, (2017)CLUE: Achieving Fast Update over Compressed Table for Parallel Lookup with Reduced Dynamic Redundancy., , , , , and . ICDCS, page 678-687. IEEE Computer Society, (2012)Towards practical use of Bloom Filter based IP lookup in operational network., , , , and . NOMS, page 1-4. IEEE, (2014)