Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Look at Targeted Attacks Through the Lense of an NGO., , , , , and . USENIX Security Symposium, page 543-558. USENIX Association, (2014)Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software., , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 312-331. Springer, (2015)Fuzzing Program Logic Deeply Hidden in Binary Program Stages., , , , and . SANER, page 105-116. IEEE, (2019)One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics., , , , , and . NDSS, The Internet Society, (2019)Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 217-230. Springer, (2013)Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks., , , and . CoRR, (2015)Automatic Generation of Data-Oriented Exploits., , , , and . USENIX Security Symposium, page 177-192. USENIX Association, (2015)"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing., , , , , and . ACM Conference on Computer and Communications Security, page 791-804. ACM, (2016)Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks., , , , , and . IEEE Symposium on Security and Privacy, page 969-986. IEEE Computer Society, (2016)Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework., , , , , and . CoRR, (2019)