关注
Ali Ahad
标题
引用次数
引用次数
年份
Swarmbug: debugging configuration bugs in swarm robotics
C Jung, A Ahad, J Jung, S Elbaum, Y Kwon
29th ACM Joint Meeting on European Software Engineering Conference and …, 2021
232021
Swarmflawfinder: Discovering and exploiting logic flaws of swarm algorithms
C Jung, A Ahad, Y Jeon, Y Kwon
2022 IEEE Symposium on Security and Privacy (SP), 1808-1825, 2022
152022
Forensic analysis of configuration-based attacks
MA Inam, W Ul Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar
Proceedings of the 2022 Network and Distributed System Security Symposium, 2022
102022
Spinner: Automated Dynamic Command Subsystem Perturbation
M Wang, C Jung, A Ahad, Y Kwon
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
42021
Pyfet: Forensically equivalent transformation for python binary decompilation
A Ahad, C Jung, A Askar, D Kim, T Kim, Y Kwon
2023 IEEE Symposium on Security and Privacy (SP), 3296-3313, 2023
32023
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
A Ahad, G Wang, CH Kim, S Jana, Z Lin, Y Kwon
28th ACM International Conference on Architectural Support for Programming …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–6