Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An In-depth Analysis of Duplicated Linux Kernel Bug Reports., , , , , , and . NDSS, The Internet Society, (2022)A Systematic Study of Elastic Objects in Kernel Exploitation., , and . CCS, page 1165-1184. ACM, (2020)Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness., , , , , and . USENIX Security Symposium, page 4247-4264. USENIX Association, (2023)DirtyCred: Escalating Privilege in Linux Kernel., , and . CCS, page 1963-1976. ACM, (2022)GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs., , , , , , and . SP, page 2078-2095. IEEE, (2022)CAMP: Compiler and Allocator-based Heap Memory Protection., , , , , and . USENIX Security Symposium, USENIX Association, (2024)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)SeaK: Rethinking the Design of a Secure Allocator for OS Kernel., , , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)