Author of the publication

Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities.

, , , , and . RAID, page 47-62. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing Mobile Agents., , and . TestCom, volume 210 of IFIP Conference Proceedings, page 95-110. Kluwer, (2002)Attacking a Complex Distributed Algorithm from Different Sides: An Experience with Complementary Validation Tools., , and . PSTV, page 3-17. North-Holland, (1984)Integration Testing of Distributed Components Based on Learning Parameterized I/O Models., , and . FORTE, volume 4229 of Lecture Notes in Computer Science, page 436-450. Springer, (2006)Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities., , , , and . RAID, page 47-62. USENIX Association, (2020)Using Estelle for Verification - An Experience with the T.70 Teletex Transport Protocol., and . FORTE, page 185-199. North-Holland, (1988)From Estelle Specifications to Industrial Test Suites, Using and Empirical Approach., and . FORTE, page 175-190. North-Holland, (1990)Using Invariant Detection Mechanism in Black Box Inference., and . ISoLA, volume RNTI-SM-1 of Revue des Nouvelles Technologies de l'Information, page 215-222. Cépaduès-Éditions, (2007)Attacking a Complex Distributed Algorithm from Different Sides: an Experience with Complementary Validation Tools., , and . Comput. Networks, (1986)Inferring Mealy Machines., and . FM, volume 5850 of Lecture Notes in Computer Science, page 207-222. Springer, (2009)Reducing Regression Test Suites using the Word2Vec Natural Language Processing Tool., , , , and . SEED/NLPaSE@APSEC, volume 2799 of CEUR Workshop Proceedings, page 43-53. CEUR-WS.org, (2020)