Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Variant Execution of Parallel Programs., , , and . CoRR, (2016)dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting., , , , and . CoRR, (2020)Garmr: Defending the gates of PKU-based sandboxing., , , and . CoRR, (2021)A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks., , , , and . CCS, page 801-814. ACM, (2022)Randomization-based Defenses against Data-Oriented Attacks.. MTD@CCS, page 1-2. ACM, (2021)KALD: Detecting Direct Pointer Disclosure Vulnerabilities., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1369-1377 (2021)PKRU-safe: automatically locking down the heap between safe and unsafe languages., , , , , , , , and . EuroSys, page 132-148. ACM, (2022)PartiSan: Fast and Flexible Sanitization via Run-time Partitioning., , , , , and . CoRR, (2017)SoK: Sanitizing for Security., , , , , , and . CoRR, (2018)Venerable Variadic Vulnerabilities Vanquished., , , , , , , and . USENIX Security Symposium, page 186-198. USENIX Association, (2017)