Author of the publication

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code.

, , , , , and . ACM Conference on Computer and Communications Security, page 1342-1353. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Honeypots - From Botnet Tracking to Intrusion Detection., and . Addison-Wesley, (2008)Measuring and Detecting Fast-Flux Service Networks., , , and . NDSS, The Internet Society, (2008)Simulation of Built-in PHP Features for Precise Static Code Analysis., and . NDSS, The Internet Society, (2014)Tracking DDoS Attacks: Insights into the Business of Disrupting the Web., and . LEET, USENIX Association, (2012)Automatic analysis of malware behavior using machine learning., , , and . Journal of Computer Security, 19 (4): 639-668 (2011)Security Measurements and Metrics for Networks.. Dependability Metrics, volume 4909 of Lecture Notes in Computer Science, page 157-165. Springer, (2005)An Exploratory Analysis of Microcode as a Building Block for System Defenses., , , , , and . ACM Conference on Computer and Communications Security, page 1649-1666. ACM, (2018)ADSandbox: sandboxing JavaScript to fight malicious websites., , and . SAC, page 1859-1864. ACM, (2010)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , and . USENIX Security Symposium, page 1985-2002. USENIX Association, (2019)AntiFuzz: Impeding Fuzzing Audits of Binary Executables., , , and . USENIX Security Symposium, page 1931-1947. USENIX Association, (2019)