Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks., , , , , , , , , and . CoRR, (2023)Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques., , , , , , , , and . CGO, page 55-67. ACM, (2023)SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization., , , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2019)ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks., , , , , , and . VEE, page 143-156. ACM, (2017)SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation., , , , , , , , and . SP, page 592-607. IEEE, (2020)FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods., , , , , , , , and . CoRR, (2022)Making Information Hiding Effective Again., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2576-2594 (2022)CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation., , , , , , , and . CCS, page 2989-3002. ACM, (2022)Using Local Clocks to Reproduce Concurrency Bugs., , , , , , , , , and 2 other author(s). IEEE Trans. Software Eng., 44 (11): 1112-1128 (2018)Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1959-1978 (May 2023)