Author of the publication

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.

, , , , and . IEEE Symposium on Security and Privacy, page 692-708. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Individually Tailored Time Management: Patient-Centric Scheduling., , , , , , and . AMIA, AMIA, (1999)The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching., , , , and . IEEE Symposium on Security and Privacy, page 692-708. IEEE Computer Society, (2015)MetaFlex: A Flexible Metaclass Generator., and . ECOOP, volume 707 of Lecture Notes in Computer Science, page 502-527. Springer, (1993)An Executable Representation of Distance and Direction., , and . LCPC, volume 589 of Lecture Notes in Computer Science, page 122-136. Springer, (1991)Dependence Flow Graphs: An Algebraic Approach to Program Dependencies., , , , and . POPL, page 67-78. ACM Press, (1991)Profile-driven Instruction Level Parallel Scheduling with Application to Super Blocks., , , , , and . MICRO, page 58-67. ACM/IEEE Computer Society, (1996)MetaMaps: Assessing understanding of large, complex or distributed knowledge domains., and . EAIT, 4 (3): 295-310 (1999)Building an Electronic Infrastructure for Health Services Research in a Distributed Telemedicine Environment., , , , , and . AMIA, AMIA, (1999)The Transmeta Code Morphing - Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges., , , , , , and . CGO, page 15-24. IEEE Computer Society, (2003)Dependence-Based Program Analysis., and . PLDI, page 78-89. ACM, (1993)