From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , и . AsiaCCS, стр. 73-85. ACM, (2019)English shellcode., , , и . ACM Conference on Computer and Communications Security, стр. 524-533. ACM, (2009)Jetset: Targeted Firmware Rehosting for Embedded Systems., , , , , , и . USENIX Security Symposium, стр. 321-338. USENIX Association, (2021)Empirical Measurement of Systemic 2FA Usability., , , , , , и . USENIX Security Symposium, стр. 127-143. USENIX Association, (2020)Multi-stage replay with crosscut., , , , , , , и . VEE, стр. 13-24. ACM, (2010)Tracing your roots: exploring the TLS trust anchor ecosystem., , , , и . Internet Measurement Conference, стр. 179-194. ACM, (2021)Security Challenges in an Increasingly Tangled Web., , , , , , и . WWW, стр. 677-684. ACM, (2017)Tracking Certificate Misissuance in the Wild., , , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 785-798. IEEE Computer Society, (2018)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , и . CHI, стр. 1-12. ACM, (2020)Understanding the Mirai Botnet., , , , , , , , , и 9 other автор(ы). USENIX Security Symposium, стр. 1093-1110. USENIX Association, (2017)