From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Shining Light On Shadow Stacks., , и . CoRR, (2018)Generating low-overhead dynamic binary translators., и . SYSTOR, ACM, (2010)Safe loading and efficient runtime confinement: A foundation for secure execution.. ETH Zurich, Zürich, Switzerland, (2012)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/72818).HexPADS: A Platform to Detect "Stealth" Attacks.. ESSoS, том 9639 из Lecture Notes in Computer Science, стр. 138-154. Springer, (2016)Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code., , , и . ICSE, стр. 1347-1359. IEEE, (2021)SecureCells: A Secure Compartmentalized Architecture., , , , , , и . SP, стр. 2921-2939. IEEE, (2023)TEEzz: Fuzzing Trusted Applications on COTS Android Devices., , , , , и . SP, стр. 1204-1219. IEEE, (2023)Hot-patching a web server: A case study of ASAP code repair., и . PST, стр. 143-150. IEEE Computer Society, (2013)Enclosure: language-based restriction of untrusted libraries., , , , и . ASPLOS, стр. 255-267. ACM, (2021)Pythia: Remote Oracles for the Masses., , и . USENIX Security Symposium, стр. 693-710. USENIX Association, (2019)