From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MemPick: High-level data structure detection in C/C++ binaries., , и . WCRE, стр. 32-41. IEEE Computer Society, (2013)Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation., , и . EuroSys, стр. 15-27. ACM, (2006)SafeCard: A Gigabit IPS on the Network Card., , , , , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 311-330. Springer, (2006)Practical Context-Sensitive CFI., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 927-940. ACM, (2015)StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries., , , , и . NDSS, The Internet Society, (2015)Howard: A Dynamic Excavator for Reverse Engineering Data Structures., , и . NDSS, The Internet Society, (2011)Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)., , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2014)MemPick: A tool for data structure detection., , и . WCRE, стр. 479-480. IEEE Computer Society, (2013)The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack., и . ACSAC, стр. 487-500. IEEE Computer Society, (2007)Pointless tainting?: evaluating the practicality of pointer tainting., и . EuroSys, стр. 61-74. ACM, (2009)