Author of the publication

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.

, , , and . NDSS, The Internet Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WEBLOG: a declarative language for secure web development., , , , , and . PLAS, page 59-70. ACM, (2013)Practical Exploit Generation for Intent Message Vulnerabilities in Android., , , and . CODASPY, page 155-157. ACM, (2015)Automatically Preparing Safe SQL Queries., , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 272-288. Springer, (2010)Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection., , , and . ICISS, volume 13784 of Lecture Notes in Computer Science, page 1-22. Springer, (2022)AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements., , and . USENIX Security Symposium, page 371-388. USENIX Association, (2010)HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows., , , , and . IEEE Symposium on Security and Privacy, page 1137-1152. IEEE, (2019)Minimizing lifetime of sensitive data in concurrent programs., , and . CODASPY, page 171-174. ACM, (2014)DEICS: Data Erasure in Concurrent Software., , and . NordSec, volume 8788 of Lecture Notes in Computer Science, page 42-58. Springer, (2014)Model-carrying code: a practical approach for safe execution of untrusted applications., , , , and . SOSP, page 15-28. ACM, (2003)TAPS: automatically preparing safe SQL queries., , and . ACM Conference on Computer and Communications Security, page 645-647. ACM, (2010)