Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries | 0 | 0.34 | 2020 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development | 0 | 0.34 | 2020 |
Large-Scale Third-Party Library Detection in Android Markets | 5 | 0.40 | 2020 |
Identifying Cache-Based Side Channels Through Secret-Augmented Abstract Interpretation | 0 | 0.34 | 2019 |
Field experience with obfuscating million-user iOS apps in large enterprise mobile development. | 1 | 0.35 | 2019 |
Software protection on the go: a large-scale empirical study on mobile app obfuscation. | 4 | 0.40 | 2018 |
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience. | 1 | 0.39 | 2018 |
Binary Code Retrofitting and Hardening Using SGX. | 0 | 0.34 | 2017 |
LibD: scalable and precise third-party library detection in android markets. | 33 | 0.79 | 2017 |
Cached: Identifying Cache-Based Timing Channels In Production Software | 5 | 0.37 | 2017 |
Composite Software Diversification | 1 | 0.43 | 2017 |
Semantics-Aware Machine Learning for Function Recognition in Binary Code | 4 | 0.40 | 2017 |
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. | 9 | 0.48 | 2016 |
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling | 8 | 0.47 | 2016 |
Reassembleable Disassembling. | 0 | 0.34 | 2015 |
FPGA Acceleration for Simultaneous Medical Image Reconstruction and Segmentation. | 1 | 0.36 | 2014 |
eDoctor: automatically diagnosing abnormal battery drain issues on smartphones | 47 | 1.45 | 2013 |