Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage., , , , , , , and . CoRR, (2023)InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android., , , , , , and . NDSS, The Internet Society, (2018)Transforming commodity security policies to enforce Clark-Wilson integrity., , , , , and . ACSAC, page 269-278. ACM, (2012)PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation., , , , and . USENIX Security Symposium, page 789-806. USENIX Association, (2020)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Analysis of virtual machine system policies., , and . SACMAT, page 227-236. ACM, (2009)JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Integrity walls: finding attack surfaces from mandatory access control policies., , , , and . AsiaCCS, page 75-76. ACM, (2012)