Author of the publication

EnBinDiff: Identifying Data-Only Patches for Binaries.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 343-359 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards understanding flash loan and its applications in defi ecosystem., , , , , , , and . CoRR, (2020)Operation-level Concurrent Transaction Execution for Blockchains., , and . CoRR, (2022)iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps., , , , , , and . CoRR, (2022)Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection., , , , , , , and . CoRR, (2023)Design and Implementation of Wireless Sensor Network for Robot Navigation., , , , , , , and . Int. J. Inf. Acquis., 4 (1): 77-89 (2007)Tracking Counterfeit Cryptocurrency End-to-end., , , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 4 (3): 50:1-50:28 (2020)SPEED: Accelerating Enclave Applications Via Secure Deduplication., , , , and . ICDCS, page 1072-1082. IEEE, (2019)Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams., , , , , , , , and . eCrime, page 1-14. IEEE, (2020)TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum., , , , , , , , and . CCS, page 120-134. ACM, (2023)Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery., , , , , , and . CCS, page 341-355. ACM, (2023)