Author of the publication

Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing.

, , and . eBPF@SIGCOMM, page 42-48. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Namespaced Kernel Audit for Containers., , , and . SoCC, page 518-532. ACM, (2021)Interactive Debugging for Big Data Analytics., , , , , , and . HotCloud, USENIX Association, (2016)Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems., , , and . NDSS, The Internet Society, (2023)SIGL: Securing Software Installations Through Deep Graph Learning., , , , , , , and . USENIX Security Symposium, page 2345-2362. USENIX Association, (2021)Provenance-based Intrusion Detection: Opportunities and Challenges., , and . TaPP, USENIX Association, (2018)Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats., , , , and . NDSS, The Internet Society, (2020)FetchBPF: Customizable Prefetching Policies in Linux with eBPF., , , , and . USENIX ATC, page 369-378. USENIX Association, (2024)Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance., , , , , , and . SP, page 3533-3551. IEEE, (2024)Splice: Efficiently Removing a User's Data from In-memory Application State., , and . CCS, page 2989-3002. ACM, (2023)Xanthus: Push-button Orchestration of Host Provenance Data Collection., , , , and . P-RECS@HPDC, page 27-32. ACM, (2020)