Search for persons
X
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
1
Shimware: Toward Practical Security Retrofitting for Monoli..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
2
HEAPSTER: Analyzing the Security of Dynamic Allocators for ..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
3
Diane: Identifying Fuzzing Triggers in Apps to Generate Und..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
4
Conware: Automated Modeling of Hardware Peripherals:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
5
Karonte: Detecting Insecure Multi-binary Interactions in Em..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
6
SPIDER: Enabling Fast Patch Propagation In Related Software..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
7
BinTrimmer: Towards Static Binary Debloating Through Abstra..:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
8