default search action
Jeffrey Gennari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Conference and Workshop Papers
- 2020
- [c13]Edward J. Schwartz, Cory F. Cohen, Jeffrey Gennari, Stephanie Schwartz:
A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks. CCS 2020: 1789-1801 - 2018
- [c12]Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines:
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. CCS 2018: 426-441 - [c11]Jeffrey Gennari, Arie Gurfinkel, Temesghen Kahsai, Jorge A. Navas, Edward J. Schwartz:
Executable Counterexamples in Software Model Checking. VSTTE 2018: 17-37 - 2016
- [c10]Bradley R. Schmerl, Jeff Gennari, Alireza Sadeghi, Hamid Bagheri, Sam Malek, Javier Cámara, David Garlan:
Architecture Modeling and Analysis of Security in Android Systems. ECSA 2016: 274-290 - [c9]Bradley R. Schmerl, Jeffrey Gennari, Javier Cámara, David Garlan:
Raindroid: a system for run-time mitigation of Android intent vulnerabilities [poster]. HotSoS 2016: 115-117 - 2015
- [c8]Bradley R. Schmerl, Jeffrey Gennari, David Garlan:
An architecture style for Android security analysis: poster. HotSoS 2015: 15:1-15:2 - 2014
- [c7]Bradley R. Schmerl, Javier Cámara, Jeffrey Gennari, David Garlan, Paulo Casanova, Gabriel A. Moreno, Thomas J. Glazier, Jeffrey M. Barnes:
Architecture-based self-protection: composing and reasoning about denial-of-service mitigations. HotSoS 2014: 2 - [c6]William Casey, Evan Wright, Jose Andre Morales, Michael Appel, Jeff Gennari, Bud Mishra:
Agent-based trace learning in a recommendation-verification system for cybersecurity. MALWARE 2014: 135-143 - [c5]Wesley Jin, Cory F. Cohen, Jeffrey Gennari, Charles Hines, Sagar Chaki, Arie Gurfinkel, Jeffrey Havrilla, Priya Narasimhan:
Recovering C++ Objects From Binaries Using Inter-Procedural Data-Flow Analysis. PPREW@POPL 2014: 1:1-1:11 - 2013
- [c4]Eric Yuan, Sam Malek, Bradley R. Schmerl, David Garlan, Jeff Gennari:
Architecture-based self-protecting software systems. QoSA 2013: 33-42 - 2003
- [c3]Jijun Wang, Michael Lewis, Jeffrey Gennari:
Interactive simulation of the NIST USAR arenas. SMC 2003: 1327-1332 - [c2]Stephen B. Hughes, Joseph Manojlovich, Michael Lewis, Jeffrey Gennari:
Camera control and decoupled motion for teleoperation. SMC 2003: 1339-1344 - [c1]Jijun Wang, Michael Lewis, Jeffrey Gennari:
Emerging areas: urban operations and UCAVs: a game engine based simulation of the NIST urban search and rescue arenas. WSC 2003: 1039-1045
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint