Author of the publication

Enforcing system-wide control flow integrity for exploit detection and diagnosis.

, , and . AsiaCCS, page 311-322. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-OS Cross-Layer Study of Bloating in User Programs, Kernel and Managed Execution Environments., , , and . FEAST@CCS, page 65-70. ACM, (2017)Debloating Software through Piece-Wise Compilation and Loading., , and . USENIX Security Symposium, page 869-886. USENIX Association, (2018)Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks., , , and . SEED, page 176-188. IEEE, (2021)MACE: high-coverage and robust memory analysis for commodity operating systems., , , and . ACSAC, page 196-205. ACM, (2014)vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries., , and . NDSS, The Internet Society, (2015)Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage., and . NordSec, volume 13700 of Lecture Notes in Computer Science, page 215-233. Springer, (2022)OS-Sommelier: memory-only operating system fingerprinting in the cloud., , , , and . SoCC, page 5. ACM, (2012)Manipulating semantic values in kernel data structures: Attack assessments and implications., , , and . DSN, page 1-12. IEEE Computer Society, (2013)Enforcing system-wide control flow integrity for exploit detection and diagnosis., , and . AsiaCCS, page 311-322. ACM, (2013)DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries., and . AsiaCCS, page 28-40. ACM, (2019)