Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Elie BurszteinSecurity and anti-abuse research lead, GoogleVerified email at google.com
Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
Christopher KruegelUniversity of California, Santa Barbara and Lastline, Inc.Verified email at cs.ucsb.edu
Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
Jacopo CorbettaUC Santa Barbara, QualcommVerified email at cs.ucsb.edu
Alexandros KapravelosAssociate Professor, North Carolina State UniversityVerified email at ncsu.edu
Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
Antonio BianchiAssistant Professor, Purdue UniversityVerified email at purdue.edu
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Steven Van AckerChalmers University of TechnologyVerified email at singularity.be
Sabyasachi SahaPrincipal Data ScientistVerified email at narus.com
Ruben TorresSymantecVerified email at symantec.com
Stanislav MiskovicSymantecVerified email at symantec.com
Sung-Ju LeeKAISTVerified email at kaist.ac.kr
Dhilung KiratResearch Scientist, IBM ResearchVerified email at us.ibm.com
Marco CovaVMware, Inc.Verified email at vmware.com
Paolo Milani ComparettiPostdoc at International Secure Systems LabVerified email at seclab.tuwien.ac.at
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu