Author of the publication

Revolver: An Automated Approach to the Detection of Evasive Web-based Malware.

, , , , and . USENIX Security Symposium, page 637-652. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rippler: Delay injection for service dependency detection., , , and . INFOCOM, page 2157-2165. IEEE, (2014)Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms., , and . WOOT, USENIX Association, (2007)Analyzing and Detecting Malicious Flash Advertisements., , , and . ACSAC, page 363-372. IEEE Computer Society, (2009)Vulnerability Analysis of MMS User Agents., and . ACSAC, page 77-88. IEEE Computer Society, (2006)Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing., and . ACSAC, page 168-178. IEEE Computer Society, (2004)NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android., , , and . SPSM@CCS, page 27-38. ACM, (2015)An anomaly-driven reverse proxy for web applications., , , and . SAC, page 361-368. ACM, (2006)Measuring E-mail header injections on the world wide web., , , , , , and . SAC, page 1647-1656. ACM, (2018)Software Engineering Issues for Network Computing., and . Requirements Targeting Software and Systems Engineering, volume 1526 of Lecture Notes in Computer Science, page 155-177. Springer, (1997)Client-side cross-site scripting protection., , , and . Computers & Security, 28 (7): 592-604 (2009)