Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices., and . CoRR, (2018)A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 322-336. Springer, (2011)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , and . NDSS, The Internet Society, (2015)Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution., and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)ShrinkWrap: VTable Protection without Loose Ends., , , , and . ACSAC, page 341-350. ACM, (2015)The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones., , and . EUROSEC, page 6:1-6:6. ACM, (2014)Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking., , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 113-128. Springer, (2011)Detecting Traffic Snooping in Tor Using Decoys., , , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 222-241. Springer, (2011)Adaptive defenses for commodity software through virtual application partitioning., , , and . CCS, page 133-144. ACM, (2012)Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard., , , , and . USENIX Security Symposium, page 417-432. USENIX Association, (2014)