Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bunshin: Compositing Security Mechanisms through Diversification (with Appendix)., , , and . CoRR, (2017)Software Watermarking using Return-Oriented Programming., , , , , and . AsiaCCS, page 369-380. ACM, (2015)Packed, Printable, and Polymorphic Return-Oriented Programming., , , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 101-120. Springer, (2011)deRop: removing return-oriented programming from malware., , , and . ACSAC, page 363-372. ACM, (2011)Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis., and . CCS, page 1867-1881. ACM, (2019)Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting., , , , , , , , and . NDSS, The Internet Society, (2015)Jekyll on iOS: When Benign Apps Become Evil., , , , and . USENIX Security Symposium, page 559-572. USENIX Association, (2013)RopSteg: program steganography with return oriented programming., , and . CODASPY, page 265-272. ACM, (2014)UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages., , , and . ACM Conference on Computer and Communications Security, page 920-932. ACM, (2016)How to Make ASLR Win the Clone Wars: Runtime Re-Randomization., , , and . NDSS, The Internet Society, (2016)