Author of the publication

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.

, , , , , , , and . USENIX Security Symposium, page 1705-1722. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binary Code Representation With Well-Balanced Instruction Normalization., , , and . IEEE Access, (2023)SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves., , , , and . IEEE/ACM Trans. Netw., 26 (5): 2174-2187 (2018)OOOE: Only-One-Object-Exists Assumption to Find Very Small Objects in Chest Radiographs., , , and . AMAI@MICCAI, volume 13540 of Lecture Notes in Computer Science, page 139-149. Springer, (2022)Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing., , and . OSDI, page 349-365. USENIX Association, (2021)A Look Back on a Function Identification Problem., , and . ACSAC, page 158-168. ACM, (2021)A scalable ordering primitive for multicore machines., , , and . EuroSys, page 34:1-34:15. ACM, (2018)ADA-VAD: Unpaired Adversarial Domain Adaptation for Noise-Robust Voice Activity Detection., , and . ICASSP, page 7327-7331. IEEE, (2022)In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication., , , , and . USENIX Security Symposium, page 89-106. USENIX Association, (2022)Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing., , , , , and . USENIX Security Symposium, page 557-574. USENIX Association, (2017)AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves., , , , , , , , , and . USENIX Security Symposium, page 4051-4068. USENIX Association, (2023)