From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation., , , , , и . Proc. ACM Program. Lang., 3 (OOPSLA): 137:1-137:31 (2019)Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine., , , , , , , и . WISA, том 13720 из Lecture Notes in Computer Science, стр. 204-221. Springer, (2022)Probabilistic disassembly., , , , , и . ICSE, стр. 1187-1198. IEEE / ACM, (2019)TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks., , , , , , , и . SP, стр. 1156-1171. IEEE, (2020)An Empirical Study of Bugs in WebAssembly Compilers., , , и . ASE, стр. 42-54. IEEE, (2021)Cubismo: decloaking server-side malware via cubist program analysis., , , , и . ACSAC, стр. 430-443. ACM, (2019)Our Journey to Becoming Agile: Experiences with Agile Transformation in Samsung Electronics., , , , и . APSEC, стр. 377-380. IEEE Computer Society, (2016)Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles., , , , и . CCS, стр. 3503-3505. ACM, (2022)DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing., , , , , и . CCS, стр. 1753-1767. ACM, (2022)TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection., , , , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)