Personensuche
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
1
Fuzzing API Error Handling Behaviors using Coverage Guided ..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
2
Aunor: Converting Rust crates to [no_std] at scale:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
3
Precision Guided Approach to Mitigate Data Poisoning Attack..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
4
Security Properties of Virtual Remotes and SPOOKing their v..:
, In:
?
Proceedings of the 24th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems ,
5
Towards Automated Identification of Layering Violations in ..:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) ,
6
Towards Rehosting Embedded Applications as Linux Applicatio..:
, In:
?
2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) ,
7
Systematically Detecting Packet Validation Vulnerabilities ..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
8
TEEzz: Fuzzing Trusted Applications on COTS Android Devices:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
9
PacJam : Securing Dependencies Continuously via Package-..:
, In:
?
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering ,
11
Cornucopia : A Framework for Feedback Guided Generation of ..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
12
Hybrid Pruning: Towards Precise Pointer and Taint Analysis:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
13
Diane: Identifying Fuzzing Triggers in Apps to Generate Und..:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
14
Toward a secure crowdsourced location tracking system:
, In:
?
Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks ,
15