Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TypeSan: Practical Type Confusion Detection., , , , , , and . ACM Conference on Computer and Communications Security, page 517-528. ACM, (2016)SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms., , , and . SP, page 1808-1825. IEEE, (2022)A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective., , , , , , , , , and 1 other author(s). CoRR, (2024)PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications., , , , , , and . CODASPY, page 209-220. ACM, (2019)FuZZan: Efficient Sanitizer Metadata Design for Fuzzing., , , and . USENIX Annual Technical Conference, page 249-263. USENIX Association, (2020)DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing., , , , , and . CCS, page 1753-1767. ACM, (2022)HexType: Efficient Detection of Type Confusion Errors for C++., , , , and . CCS, page 2373-2387. ACM, (2017)ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs., , , , , , , and . AsiaCCS, page 534-545. ACM, (2022)A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery., , , and . SEGS@CCS, page 35-40. ACM, (2013)Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique., , , , and . USENIX Security Symposium, page 6825-6842. USENIX Association, (2023)