Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static Enforcement of Web Application Integrity Through Strong Typing., and . USENIX Security Symposium, page 283-298. USENIX Association, (2009)Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services., , , and . USENIX Security Symposium, page 687-702. USENIX Association, (2013)HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security., , , , , and . USENIX Security Symposium, page 99-116. USENIX Association, (2018)Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts., , , , , , , and . USENIX Security Symposium, page 1793-1810. USENIX Association, (2023)Efficient Detection of Split Personalities in Malware., , , , , and . NDSS, The Internet Society, (2010)Effective Anomaly Detection with Scarce Training Data., , , and . NDSS, The Internet Society, (2010)BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments., , , , , , , , , and . NDSS, The Internet Society, (2017)Nazca: Detecting Malware Distribution in Large-Scale Networks., , , , , , , and . NDSS, The Internet Society, (2014)When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features., , , , , , , and . NDSS, The Internet Society, (2020)Broken Fingers: On the Usage of the Fingerprint API in Android., , , , , , and . NDSS, The Internet Society, (2018)