Personensuche
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Timely Identification of Victim Addresses in DeFi Attacks:
, In:
?
Mathematical Research for Blockchain Economy; Lecture Notes in Operations Research ,
2
Gas Gauge: A Security Analysis Tool for Smart Contract Out-..:
, In:
?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis ,
3
Green Fuzzing: A Saturation-Based Stopping Criterion using ..:
, In:
?
Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis ,
4
An empirical study on the effectiveness of static C code an..:
, In:
?
2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
5
FuzzTastic: A Fine-grained, Fuzzer-agnostic Coverage Analyz..:
, In:
?
Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion Proceedings ,
6
FuzzTastic : a fine-grained, fuzzer-agnostic coverage an..:
, In:
?
Annual Computer Security Applications Conference ,
9
Dynamic Taint Analysis versus Obfuscated Self-Checking:
, In:
?
2020 IEEE International Conference on Blockchain (Blockchain) ,
11
Constant-Time Updates Using Token Mechanics:
, In:
?
2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) ,
12
MPro: Combining Static and Symbolic Analysis for Scalable T..:
, In:
?
Proceedings of the 3rd ACM Workshop on Software Protection ,
13
VirtSC : Combining Virtualization Obfuscation with Self-..:
, In:
?
Proceedings of the 35th Annual Computer Security Applications Conference ,
14
SIP shaker : software integrity protection composition:
, In:
?
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy ,
15