From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disk|Crypt|Net: rethinking the stack for high-performance video streaming., , , и . SIGCOMM, стр. 211-224. ACM, (2017)A decade of OS access-control extensibility.. Commun. ACM, 56 (2): 52-63 (2013)Into the depths of C: elaborating the de facto standards., , , , , , и . PLDI, стр. 1-15. ACM, (2016)Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process., , , , , , , , , и 3 other автор(ы). SP, стр. 1003-1020. IEEE, (2020)CHERI JNI: Sinking the Java Security Model into the C., , , , , , , , , и 5 other автор(ы). ASPLOS, стр. 569-583. ACM, (2017)CHERI Macaroons: Efficient, host-based access control for cyber-physical systems., , , , и . EuroS&P Workshops, стр. 688-693. IEEE, (2020)Metrics for Security and Performance in Low-Latency Anonymity Systems., и . Privacy Enhancing Technologies, том 5134 из Lecture Notes in Computer Science, стр. 115-132. Springer, (2008)CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment., , , , , , , , , и 11 other автор(ы). ASPLOS, стр. 379-393. ACM, (2019)Towards a Theory of Application Compartmentalisation (Transcript of Discussion).. Security Protocols Workshop, том 8263 из Lecture Notes in Computer Science, стр. 28-38. Springer, (2013)Exploiting Concurrency Vulnerabilities in System Call Wrappers.. WOOT, USENIX Association, (2007)