From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection., , , , , , , и . Trans. Comput. Sci., (2009)The essence of command injection attacks in web applications., и . POPL, стр. 372-382. ACM, (2006)Static detection of cross-site scripting vulnerabilities., и . ICSE, стр. 171-180. ACM, (2008)Validity Checking for Finite Automata over Linear Arithmetic Constraints., и . FSTTCS, том 4337 из Lecture Notes in Computer Science, стр. 405-416. Springer, (2006)ExecRecorder: VM-based full-system replay for attack analysis and system recovery., , , , , и . ASID, стр. 66-71. ACM, (2006)Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks., , , , , , и . NOMS, стр. 121-128. IEEE, (2008)Sound and precise analysis of web applications for injection vulnerabilities., и . PLDI, стр. 32-41. ACM, (2007)An Analysis Framework for Security in Web Applications, и . Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004), стр. 70--78. (2004)Static checking of dynamically generated queries in database applications., , , и . ACM Trans. Softw. Eng. Methodol., 16 (4): 14 (2007)Temporal search: detecting hidden malware timebombs with virtual machines., , , , , и . ASPLOS, стр. 25-36. ACM, (2006)