From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SoK: Introspections on Trust and the Semantic Gap., , , , и . IEEE Symposium on Security and Privacy, стр. 605-620. IEEE Computer Society, (2014)x86-64 instruction usage among C/C++ applications., , , , и . SYSTOR, стр. 68-79. ACM, (2019)A Clairvoyant Approach to Evaluating Software (In)Security., , и . HotOS, стр. 62-68. ACM, (2017)Introspections on the Semantic Gap., , , , и . IEEE Secur. Priv., 13 (2): 48-55 (2015)Civet: An Efficient Java Partitioning Framework for Hardware Enclaves., , , , , и . USENIX Security Symposium, стр. 505-522. USENIX Association, (2020)Containing the Hype., , и . APSys, стр. 8:1-8:9. ACM, (2015)What to Support When You're Supporting: A Study of Linux API Usage and Compatibility., , , и . login Usenix Mag., (2016)A study of modern Linux API usage and compatibility: what to support when you're supporting., , , и . EuroSys, стр. 16:1-16:16. ACM, (2016)Cooperation and security isolation of library OSes for multi-process applications., , , , , , , , , и . EuroSys, стр. 9:1-9:14. ACM, (2014)Practical techniques to obviate setuid-to-root binaries., , , и . EuroSys, стр. 8:1-8:14. ACM, (2014)