Author of the publication

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.

, , , , and . CCS, page 1690-1701. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational Decoys for Cloud Security., , and . Secure Cloud Computing, Springer, (2014)Worm Propagation Strategies in an IPv6 Internet., , and . login Usenix Mag., (2006)On the General Applicability of Instruction-Set Randomization., , , , and . IEEE Trans. Dependable Secur. Comput., 7 (3): 255-270 (2010)Randomized Instruction Sets and Runtime Environments Past Research and Future Directions.. IEEE Secur. Priv., 7 (1): 18-25 (2009)The dual receiver cryptosystem and its applications., , , and . CCS, page 330-343. ACM, (2004)Efficient, DoS-resistant, secure key exchange for internet protocols., , , , , , and . ACM Conference on Computer and Communications Security, page 48-58. ACM, (2002)How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints., , , and . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)Detection and analysis of eavesdropping in anonymous communication networks., , , and . Int. J. Inf. Sec., 14 (3): 205-220 (2015)Privacy as an Operating System Service., , and . HotSec, USENIX Association, (2006)Transparent ROP Exploit Mitigation Using Indirect Branch Tracing., , and . USENIX Security Symposium, page 447-462. USENIX Association, (2013)