Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DexterJS: robust testing platform for DOM-based XSS vulnerabilities., , , , , and . ESEC/SIGSOFT FSE, page 946-949. ACM, (2015)The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript., , and . ACM Conference on Computer and Communications Security, page 1542-1557. ACM, (2015)Auto-patching DOM-based XSS at scale., , , , , and . ESEC/SIGSOFT FSE, page 272-283. ACM, (2015)Language-Based Hypervisors., , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 731-736. (2016)Autonomous telecommunication networks coverage area expansion in disaster area using mobile robots., , , , , , , and . MHS, page 361-366. IEEE, (2011)You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers., , , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 150-171. Springer, (2014)