Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Race Vulnerabilities in Web Applications., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 126-142. Springer, (2008)FluXOR: Detecting and Monitoring Fast-Flux Service Networks., , , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 186-206. Springer, (2008)A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators., , , and . WOOT, page 1-7. USENIX Association, (2009)A Smart Fuzzer for x86 Executables., , , and . SESS@ICSE, page 7. IEEE Computer Society, (2007)Automatic Generation of Remediation Procedures for Malware Infections., , , , , , and . USENIX Security Symposium, page 419-434. USENIX Association, (2010)Testing system virtual machines., , , and . ISSTA, page 171-182. ACM, (2010)A methodology for testing CPU emulators., , , , and . ACM Trans. Softw. Eng. Methodol., 22 (4): 29:1-29:26 (2013)Conqueror: Tamper-Proof Code Execution on Legacy Systems., , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 21-40. Springer, (2010)Dynamic and transparent analysis of commodity production systems., , , and . ASE, page 417-426. ACM, (2010)N-version disassembly: differential testing of x86 disassemblers., , , and . ISSTA, page 265-274. ACM, (2010)