Author of the publication

Real-World Buffer Overflow Protection for Userspace and Kernelspace.

, , and . USENIX Security Symposium, page 395-410. USENIX Association, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor., , and . DSN, page 105-114. IEEE Computer Society, (2009)qTLB: Looking Inside the Look-Aside Buffer., , , , , and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 107-118. Springer, (2007)Tuning SoCs using the global dynamic critical path., , , and . SoCC, page 407-411. IEEE, (2009)Ordering decoupled metadata accesses in multiprocessors.. MICRO, page 381-390. ACM, (2009)Thread-safe dynamic binary translation using transactional memory., , , and . HPCA, page 279-289. IEEE Computer Society, (2008)Raksha: a flexible information flow architecture for software security., , and . ISCA, page 482-493. ACM, (2007)Tainting is not pointless., , and . ACM SIGOPS Oper. Syst. Rev., 44 (2): 88-92 (2010)From chaos to QoS: case studies in CMP resource management., , , , , , , and . SIGARCH Comput. Archit. News, 35 (1): 21-30 (2007)Hardware Enforcement of Application Security Policies Using Tagged Memory., , , and . OSDI, page 225-240. USENIX Association, (2008)Real-World Buffer Overflow Protection for Userspace and Kernelspace., , and . USENIX Security Symposium, page 395-410. USENIX Association, (2008)