Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)An Evil Copy: How the Loader Betrays You., , and . NDSS, The Internet Society, (2017)HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs., , , , , , and . CCS, page 366-378. ACM, (2021)An SVD-based Collaborative Filtering approach to alleviate cold-start problems., and . FSKD, page 1474-1477. IEEE, (2012)A 0D-3D multi-scale model of the portal venous system coupled with the entire cardiovascular system applied to predict postsplenectomy hemodynamic metrics., , , , , and . EMBC, page 1-4. IEEE, (2023)A new prediction approach based on linear regression for collaborative filtering., , , and . FSKD, page 2586-2590. IEEE, (2011)Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud., , , , , and . OSDI, page 247-267. USENIX Association, (2023)Reverse Debugging of Kernel Failures in Deployed Systems., , and . USENIX ATC, page 281-292. USENIX Association, (2020)