Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Giovanni Vigna
UC Santa Barbara and VMware
Verified email at cs.ucsb.edu
Cited by 41275
Computer Security
Network Security
Web Security
Binary Analysis
Malware
Jeffrey Hollingsworth
Professor of Computer Science, University of Maryland
Verified email at umd.edu
Cited by 8437
Parallel Computing
Binary Analysis
Auto-tuning
Stephen McCamant
Associate Professor, University of Minnesota
Verified email at cs.umn.edu
Cited by 6250
Binary analysis
Symbolic execution
Quantitative information flow
Model counting
Software-based Fault Isolation
Yan Shoshitaishvili
Arizona State University
Verified email at asu.edu
Cited by 5713
binary analysis
system security
awesomeness
Ruoyu "Fish" Wang
Arizona State University
Verified email at asu.edu
Cited by 4462
System Security
Binary Analysis
Christopher Salls
UC Santa Barbara
Verified email at cs.ucsb.edu
Cited by 2975
Computer Security
Binary Analysis
Mahin Chandramohan
NTU Singapore
Verified email at e.ntu.edu.sg
Cited by 2806
Malware Analysis
Software Security
Machine Learning
Program Analysis
Binary Analysis
Antonio Bianchi
Assistant Professor, Purdue University
Verified email at purdue.edu
Cited by 2525
Computer Security
System Security
Mobile Security
Binary Analysis
Audrey Dutcher
Student, Arizona State University
Verified email at rhelmot.io
Cited by 2453
Binary Analysis
Decompilation
Symbolic Execution
Reverse Engineering
Ralf-Philipp Weinmann
Comsecuris GmbH
Verified email at comsecuris.com
Cited by 1972
cryptology
reverse engineering
binary analysis
emulation
1 - 10
Privacy
Terms
Help
About Scholar
Search help