Author of the publication

Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly

, , , and . 43rd IEEE Symposium on Security and Privacy, page 1574-1589. Piscataway, NJ, IEEE, (2022)
DOI: 10.1109/SP46214.2022.00064

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adjust: runtime mitigation of resource abusing third-party online ads., , and . ICSE, page 1005-1015. IEEE / ACM, (2019)Protecting Semantic Trajectory Privacy for VANET with Reinforcement Learning., , , , and . ICC, page 1-5. IEEE, (2019)Defeating Program Analysis Techniques via Ambiguous Translation., , , , , and . ASE, page 1382-1387. IEEE, (2021)A High-Computational Efficiency Human Detection and Flow Estimation Method Based on TOF Measurements., , , , , , and . Sensors, 19 (3): 729 (2019)MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation., , , , , , , , , and 2 other author(s). NDSS, The Internet Society, (2018)ARROW: automated repair of races on client-side web pages., , , , , and . ISSTA, page 201-212. ACM, (2016)Birds Bring Flues? Mining Frequent and High Weighted Cliques from Birds Migration Networks., , , , , , , and . DASFAA (2), volume 5982 of Lecture Notes in Computer Science, page 359-369. Springer, (2010)AdBudgetKiller: Online Advertising Budget Draining Attack., , , , , , and . WWW, page 297-307. ACM, (2018)Trojaning Attack on Neural Networks., , , , , , and . NDSS, The Internet Society, (2018)CPR: cross platform binary code reuse via platform independent trace program., , , , and . ISSTA, page 158-169. ACM, (2017)