Author of the publication

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.

, , , , and . IEEE Trans. Software Eng., 43 (12): 1157-1177 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding., , , , , and . DSN, page 530-542. IEEE, (2019)A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples., , , , and . CoRR, (2018)Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (6): 2582-2600 (2021)No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware., , , and . MobiSys, page 205-218. ACM, (2023)G2Auth: secure mutual authentication for drone delivery without special user-side hardware., , , and . MobiSys, page 84-98. ACM, (2022)Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (3): 146:1-146:25 (2022)Deep Learning Approach Protecting Privacy in Camera-Based Critical Applications., , , , and . CoRR, (2021)Privacy Leakage Analysis for Colluding Smart Apps., and . DSN Workshops, page 96-102. IEEE, (2022)Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs., , , , , and . NDSS, The Internet Society, (2019)Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection., , , , and . SIGSOFT FSE, page 389-400. ACM, (2014)