Author of the publication

TypeMiner: Recovering Types in Binary Programs Using Machine Learning.

, , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 288-308. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)ZOE: Content-Based Anomaly Detection for Industrial Control Systems., , and . DSN, page 127-138. IEEE Computer Society, (2018)TypeMiner: Recovering Types in Binary Programs Using Machine Learning., , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 288-308. Springer, (2019)Don't Paint It Black: White-Box Explanations for Deep Learning in Computer Security., , , and . CoRR, (2019)Harry: A Tool for Measuring String Similarity., and . J. Mach. Learn. Res., (2016)New Kid on the Web: A Study on the Prevalence of WebAssembly in the Wild., , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 23-42. Springer, (2019)Comprehensive Analysis and Detection of Flash-Based Malware., , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 101-121. Springer, (2016)Poisoning behavioral malware clustering., , , , , , and . AISec@CCS, page 27-36. ACM, (2014)Political Elections Under (Social) Fire? Analysis and Detection of Propaganda on Twitter., , , and . CoRR, (2019)Sally: a tool for embedding strings in vector spaces., , and . J. Mach. Learn. Res., (2012)