Publications

Flow-Insensitive Type Qualifiers

Transactions on Programming Languages. (2008).
A practical mimicry attack against powerful system-call monitors

Proceedings of the 2008 ACM symposium on Information, computer and communications security. (2008).
RICH: Automatically protecting against integer-based vulnerabilities

Network and Distributed Systems Security (NDSS). (2007).
More content-less control: Access control in the web 2.0

IEEE Web 2.0 Security and Privacy Workshop. (2007).
Efficient and accurate detection of integer-based attacks

Proc. 14th Annual Network and Distributed System Security Symp.(NDSS’07). (2007).
Deflation-secure web metering

International Journal of Information and Computer Security. (2007).
Fixing races for fun and profit: how to abuse atime

USENIX Security. (2005).