Cited By
View all- Samhi JGao JDaoudi NGraux PHoyez HSun XAllix KBissyandé TKlein JDwyer MDamian DZeller A(2022)JuCifyProceedings of the 44th International Conference on Software Engineering10.1145/3510003.3512766(1232-1244)Online publication date: 21-May-2022
- Yao YZhou WJia YZhu LLiu PZhang Y(2019)Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic ExecutionComputer Security – ESORICS 201910.1007/978-3-030-29959-0_31(638-657)Online publication date: 23-Sep-2019
- Wang XMa HJing LMakarevich OPoet RElçi AGaur MOrgun MBabenko LFerdous SHo ALaxmi VPieprzyk J(2015)A dynamic marking method for implicit information flow in dynamic taint analysisProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2799988(275-282)Online publication date: 8-Sep-2015
- Show More Cited By