Author of the publication

Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract).

, and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 41-50. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Benchmarking Flaws in Systems Security., , , , and . EuroS&P, page 310-325. IEEE, (2019): Practical Cache Attacks from the Network., , , , , and . SP, page 20-38. IEEE, (2020)VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching., , , , , , and . CoRR, (2020)Now You See Me: Real-time Dynamic Function Call Detection., , , , and . ACSAC, page 618-628. ACM, (2018)ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks., , , , , , and . OSDI, page 697-710. USENIX Association, (2018)Benchmarking Flaws Undermine Security Research., , , , and . IEEE Secur. Priv., 18 (3): 48-57 (2020)SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets., , , , , , and . IEEE Symposium on Security and Privacy, page 97-111. IEEE Computer Society, (2013)VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching., , , , , , and . ACSAC, page 97-112. ACM, (2019)Compiler-Agnostic Function Detection in Binaries., , and . EuroS&P, page 177-189. IEEE, (2017)An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries., , , , and . USENIX Security Symposium, page 583-600. USENIX Association, (2016)