Cited By
View all- Cornelissen EShcherbakov MBalliu MBalzarotti DXu W(2024)GHUNTERProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699107(3693-3710)Online publication date: 14-Aug-2024
- Troppmann DFass AStaicu CFilkov VRay BZhou M(2024)Typed and Confused: Studying the Unexpected Dangers of Gradual TypingProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695549(1858-1870)Online publication date: 27-Oct-2024
- Shcherbakov MMoosbrugger PBalliu MChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint AnalysisProceedings of the ACM Web Conference 202410.1145/3589334.3645579(1800-1811)Online publication date: 13-May-2024
- Show More Cited By