Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)GRIFFIN: Guarding Control Flows Using Intel Processor Trace., , and . ASPLOS, page 585-598. ACM, (2017)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)Fine-Grained Control-Flow Integrity for Kernel Software., , , and . EuroS&P, page 179-194. IEEE, (2016)Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory., , , , and . SEED, page 133-144. IEEE, (2022)REPT: Reverse Debugging of Failures in Deployed Software., , , , , , and . OSDI, page 17-32. USENIX Association, (2018)Lazy Diagnosis of In-Production Concurrency Bugs., , , and . SOSP, page 582-598. ACM, (2017)