From post

BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.

, , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 118-137. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scanning the Internet for ROS: A View of Security in Robotics Research., , , , и . CoRR, (2018)BinWrap: Hybrid Protection against Native Node.js Add-ons., , , , , и . AsiaCCS, стр. 429-442. ACM, (2023)ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches., , , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 400-417. Springer, (2012)VTPin: practical VTable hijacking protection for binaries., , , и . ACSAC, стр. 448-459. ACM, (2016)IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks., , , , и . USENIX Security Symposium, стр. 2383-2400. USENIX Association, (2023)libdft: practical dynamic data flow tracking for commodity systems., , , и . VEE, стр. 121-132. ACM, (2012)BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection., , , , , и . RAID, том 6307 из Lecture Notes in Computer Science, стр. 118-137. Springer, (2010)Reviving instruction set randomization., , и . HOST, стр. 21-28. IEEE Computer Society, (2017)CellFlood: Attacking Tor Onion Routers on the Cheap., , , и . ESORICS, том 8134 из Lecture Notes in Computer Science, стр. 664-681. Springer, (2013)ret2dir: Rethinking Kernel Isolation., , и . USENIX Security Symposium, стр. 957-972. USENIX Association, (2014)