Cited By
View all- Roth SGröber LBaus PKrombholz KStock BBalzarotti DXu W(2024)Trust me if you canProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699236(6003-6020)Online publication date: 14-Aug-2024
- Shcherbakov MMoosbrugger PBalliu MChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint AnalysisProceedings of the ACM Web Conference 202410.1145/3589334.3645579(1800-1811)Online publication date: 13-May-2024
- Wang XZhuang ZMeng WCheng JChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Detecting and Understanding Self-Deleting JavaScript CodeProceedings of the ACM Web Conference 202410.1145/3589334.3645540(1768-1778)Online publication date: 13-May-2024
- Show More Cited By