From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication., , , , , и . CoRR, (2018)Exploitation Techniques and Defenses for Data-Oriented Attacks., , , , , , и . SecDev, стр. 114-128. IEEE, (2019)Hardware Platform Security for Mobile Devices., , , , , и . Found. Trends Priv. Secur., 3 (3-4): 214-394 (2022)Camouflage: Hardware-assisted CFI for the ARM Linux kernel., , , и . CoRR, (2019)Hardware-assisted memory safety.. Aalto University, Espoo, Finland, (2020)base-search.net (ftaaltouniv:oai:aaltodoc.aalto.fi:123456789/42353).Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks., , , , , и . USENIX Security Symposium, стр. 1433-1450. USENIX Association, (2023)PAC it up: Towards Pointer Integrity using ARM Pointer Authentication., , , , , и . USENIX Security Symposium, стр. 177-194. USENIX Association, (2019)Authenticated Call Stack., , , и . DAC, стр. 223. ACM, (2019)Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches., , , , , , , и . ACM Trans. Priv. Secur., 24 (4): 26:1-26:36 (2021)Camouflage: Hardware-assisted CFI for the ARM Linux kernel., , , и . DAC, стр. 1-6. IEEE, (2020)