From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning., , , , , , и . WISEC, стр. 1-11. ACM, (2018)Detection and Analysis of Cryptographic Data Inside Software., , , и . ISC, том 7001 из Lecture Notes in Computer Science, стр. 182-196. Springer, (2011)SMARTSHIELD: Automatic Smart Contract Protection Made Easy., , , , , и . SANER, стр. 23-34. IEEE, (2020)APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps., , , , и . SANER, стр. 344-354. IEEE, (2019)Rethinking the security of IoT from the perspective of developer customized device-cloud interaction., , и . SAC, стр. 210-213. ACM, (2022)NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification., , , , , , , и . RAID, стр. 309-321. USENIX Association, (2019)Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis., , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 252-263. Springer, (2012)EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts., , , и . SANER, стр. 116-126. IEEE, (2020)Android Malware Forensics: Reconstruction of Malicious Events., , и . ICDCS Workshops, стр. 552-558. IEEE Computer Society, (2012)Digital Forensic Analysis on Runtime Instruction Flow., , , и . e-Forensics, том 56 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 168-178. Springer, (2010)