Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BootKeeper: Validating Software Integrity Properties on Boot Firmware Images., , , , , , , , and . CODASPY, page 315-325. ACM, (2019)Intrusion detection in distributed systems, an approach based on taint marking., , , and . ICC, page 1962-1967. IEEE, (2013)Information Flow Control for Intrusion Detection Derived from MAC Policy., , , and . ICC, page 1-6. IEEE, (2011)SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis., , , , , , , , , and 1 other author(s). IEEE Symposium on Security and Privacy, page 138-157. IEEE Computer Society, (2016)A taint marking approach to confidentiality violation detection., , , and . AISC, volume 125 of CRPIT, page 83-90. Australian Computer Society, (2012)Sleak: automating address space layout derandomization., , , , , and . ACSAC, page 190-202. ACM, (2019)Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware., , , , and . NDSS, The Internet Society, (2015)A Binary Analysis Approach to Retrofit Security in Input Parsing Routines., , , and . IEEE Symposium on Security and Privacy Workshops, page 306-322. IEEE Computer Society, (2018)