Cited By
View all- Yu XJin GChaudron MCrnkovic IChechik MHarman M(2018)Dataflow tunnelingProceedings of the 40th International Conference on Software Engineering10.1145/3180155.3180171(586-597)Online publication date: 27-May-2018
- Pan XCao YLiu SZhou YChen YZhou TWeippl EKatzenbeisser SKruegel CMyers AHalevi S(2016)CSPAutoGenProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978384(653-665)Online publication date: 24-Oct-2016
- Alhuzali AEshete BGjomemo RVenkatakrishnan VWeippl EKatzenbeisser SKruegel CMyers AHalevi S(2016)ChainsawProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978380(641-652)Online publication date: 24-Oct-2016
- Show More Cited By