Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhen HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
Lionel LittyMenlo SecurityVerified email at menlosecurity.com
Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Beom Heyn KimUniversity of TorontoVerified email at cs.toronto.edu
Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Marsha Chechik Professor of Computer Science, University of TorontoVerified email at cs.toronto.edu
patrick lincolnSRIVerified email at sri.com
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
Phillipa GillResearch Scientist @ GoogleVerified email at google.com
Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Úlfar ErlingssonArchitect at LaceworkVerified email at lacework.net
Ilya MironovMetaVerified email at meta.com
Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
Mohammad MannanAssociate Professor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca