Author of the publication

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.

, , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust scareware image detection., , , , and . ICASSP, page 2920-2924. IEEE, (2013)Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification., , , and . Libr. Hi Tech, 38 (4): 819-833 (2020)OEI: Operation Execution Integrity for Embedded Devices., , , and . CoRR, (2018)Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems., , , , and . AsiaCCS, page 652-665. ACM, (2017)D-Box: DMA-enabled Compartmentalization for Embedded Applications., , , , and . NDSS, The Internet Society, (2022)Remix: On-demand Live Randomization., , , and . CODASPY, page 50-61. ACM, (2016)Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology., and . ICSH, volume 11924 of Lecture Notes in Computer Science, page 39-47. Springer, (2019)OAT: Attesting Operation Integrity of Embedded Devices., , , and . SP, page 1433-1449. IEEE, (2020)SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning., , , , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 130-150. Springer, (2021)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)