Personensuche
X
?
Proceedings of the 32nd ACM SIGPLAN International Conference on Compiler Construction ,
1
Automatically Localizing Dynamic Code Generation Bugs in JI..:
, In:
?
Proceedings of the 11th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis ,
2
Modeling code manipulation in JIT compilers:
, In:
?
Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks ,
3
Optimization to the Rescue : Evading Binary Code Stylome..:
, In:
?
Proceedings of the 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments ,
4
Automated bug localization in JIT compilers:
, In:
?
Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks ,
5
A Framework for Automatic Exploit Generation for JIT Compil..:
, In:
?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering ,
6
Representing and reasoning about dynamic code:
, In:
?
Languages and Compilers for Parallel Computing; Lecture Notes in Computer Science ,
7
Language-Agnostic Optimization and Parallelization for Inte..:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
8
Probabilistic Obfuscation Through Covert Channels:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
9
Analysis of Exception-Based Control Transfers:
, In:
?
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy ,
10
Identifying and Understanding Self-Checksumming Defenses in..:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
12
Symbolic Execution of Obfuscated Code:
, In:
?
Proceedings of the 4th Program Protection and Reverse Engineering Workshop ,
13
A Framework for Understanding Dynamic Anti-Analysis Defense:
, In:
?
Proceedings of the Tenth International Symposium on Code Generation and Optimization ,
14
Micro-specialization : dynamic code specialization of da..:
, In:
?
Proceedings of the 18th ACM conference on Computer and communications security ,
15