Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PIEtrace: Platform independent executable trace., , and . ASE, page 48-58. IEEE, (2013)Non-Stop & Non-Breakable Code Review Services in a Distributed System: Detecting Issues in Real Time., , , and . CoRR, (2022)Defeating Program Analysis Techniques via Ambiguous Translation., , , , , and . ASE, page 1382-1387. IEEE, (2021)RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications., , , , , , and . ACSAC, page 412-424. ACM, (2017)Lprov: Practical Library-aware Provenance Tracing., , , , and . ACSAC, page 605-617. ACM, (2018)AdBudgetKiller: Online Advertising Budget Draining Attack., , , , , , and . WWW, page 297-307. ACM, (2018)Swarmbug: debugging configuration bugs in swarm robotics., , , , and . ESEC/SIGSOFT FSE, page 868-880. ACM, (2021)J-Force: Forced Execution on JavaScript., , , , , , and . WWW, page 897-906. ACM, (2017)MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation., , , , , , , , , and 2 other author(s). NDSS, The Internet Society, (2018)Dual Execution for On the Fly Fine Grained Execution Comparison., , , , and . ASPLOS, page 325-338. ACM, (2015)