Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing a secure setuid program., and . Parallel and Distributed Computing and Networks, page 301-309. IASTED/ACTA Press, (2004)An integrated laboratory for computer architecture and networking., , , , and . WCAE, page 21. ACM, (2002)Simplifying security policy descriptions for internet servers in secure operating systems., , , and . SAC, page 326-333. ACM, (2009)Traveling forward in time to newer operating systems using ShadowReboot., and . APSys, page 12. ACM, (2011)Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows., , and . SAC, page 1293-1300. ACM, (2023)Is Linux Kernel Oops Useful or Not?, , and . HotDep, USENIX Association, (2012)Clickjuggler: Checking for incomplete defenses against clickjacking., and . PST, page 224-231. IEEE Computer Society, (2014)Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation., , , and . ASIAN, volume 2896 of Lecture Notes in Computer Science, page 18-32. Springer, (2003)Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQ., , and . SRDS, page 329-331. IEEE, (2020)Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains., , and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 172-184. Springer, (2002)