From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Misuse of Android Unix Domain Sockets and Security Implications., , , , и . ACM Conference on Computer and Communications Security, стр. 80-91. ACM, (2016)Multipath TCP traffic diversion attacks and countermeasures., , , , и . ICNP, стр. 1-10. IEEE Computer Society, (2017)The Taming of the Stack: Isolating Stack Data from Memory Errors., , , , , , и . NDSS, The Internet Society, (2022)App in the Middle: Demystify Application Virtualization in Android and its Security Threats., , , , , , , и . SIGMETRICS (Abstracts), стр. 75-76. ACM, (2019)A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel., , , , , и . USENIX Security Symposium, стр. 4211-4228. USENIX Association, (2023)Application level attacks on Connected Vehicle Protocols., , , , , и . RAID, стр. 459-471. USENIX Association, (2019)Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK., , , , , , , , и . SP, стр. 650-665. IEEE, (2022)Top of the Heap: Efficient Memory Error Protection for Many Heap Objects., , , , , и . CoRR, (2023)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , и . AsiaCCS, стр. 543-554. ACM, (2015)Static Detection of Filesystem Vulnerabilities in Android Systems., , , и . CoRR, (2024)