From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks., , и . EuroS&P, стр. 514-529. IEEE, (2017)On the Effectiveness of Code Normalization for Function Identification., , , и . PRDC, стр. 241-251. IEEE, (2018)TypeSan: Practical Type Confusion Detection., , , , , , и . ACM Conference on Computer and Communications Security, стр. 517-528. ACM, (2016)MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1714-1730. ACM, (2018)Practical Context-Sensitive CFI., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 927-940. ACM, (2015)SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript., , , , , и . USENIX Security Symposium, стр. 1001-1018. USENIX Association, (2021)StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries., , , , и . NDSS, The Internet Society, (2015)Howard: A Dynamic Excavator for Reverse Engineering Data Structures., , и . NDSS, The Internet Society, (2011)Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities., , и . NDSS, The Internet Society, (2017)LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating., , , и . RAID, стр. 62-77. ACM, (2021)