Author of the publication

Countering kernel rootkits with lightweight hook protection.

, , , and . ACM Conference on Computer and Communications Security, page 545-554. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REPT: Reverse Debugging of Failures in Deployed Software., , , , , , and . OSDI, page 17-32. USENIX Association, (2018)Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory., , , , and . SEED, page 133-144. IEEE, (2022)ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing., , , and . S&P, page 252-266. IEEE Computer Society, (2007)Lazy Diagnosis of In-Production Concurrency Bugs., , , and . SOSP, page 582-598. ACM, (2017)Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud., , and . CCS, page 1231-1242. ACM, (2022)Research on Fault Diagnosis Technology of Model Support System based on Feature Extraction., , , , , and . ISCID, page 155-158. IEEE, (2022)Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers., , and . ACSAC, page 361-370. IEEE Computer Society, (2005)Tracking Rootkit Footprints with a Practical Memory Analysis System., , , and . USENIX Security Symposium, page 601-615. USENIX Association, (2012)Protocol-Independent Adaptive Replay of Application Dialog., , , and . NDSS, The Internet Society, (2006)Countering kernel rootkits with lightweight hook protection., , , and . ACM Conference on Computer and Communications Security, page 545-554. ACM, (2009)