2013 conference paper
Fast, scalable detection of "piggybacked" mobile applications
ACM Conference on Data and Application Security and Privacy, 185–195.
2010 conference paper
DKSM: Subverting virtual machine introspection for fun and profit
2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.