Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted Disk Loading in the Emulab Network Testbed., , , and . CSET, USENIX Association, (2010)Is Big Data Performance Reproducible in Modern Cloud Networks?, , , , , , , and . NSDI, page 513-527. USENIX Association, (2020)Fluorescence: Detecting Kernel-Resident Malware in Clouds., , , , , and . RAID, page 367-382. USENIX Association, (2019)GPUstore: harnessing GPU computing for storage systems in the OS kernel., , and . SYSTOR, page 6. ACM, (2012)OpenEdge: A dynamic and secure open service edge network., , , , , and . NOMS, page 257-264. IEEE, (2016)Harpocrates: Giving Out Your Secrets and Keeping Them Too., , , and . SEC, page 103-114. IEEE, (2018)PopperCI: Automated reproducibility validation., , , , , , and . INFOCOM Workshops, page 450-455. IEEE, (2017)MME-FaaS Cloud-Native Control for Mobile Networks., and . SoCC, page 152-157. ACM, (2019)I Heard It through the Firewall: Exploiting Cloud Management Services as an Information Leakage Channel., , , and . SoCC, page 361-373. ACM, (2018)Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them., , , , and . NSDI, USENIX Association, (2024)