Author of the publication

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.

, , , , , , and . CODASPY, page 209-220. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)TINET: Learning Invariant Networks via Knowledge Transfer., , , , , , and . KDD, page 1890-1899. ACM, (2018)Towards a Timely Causality Analysis for Enterprise Security., , , , , , , and . NDSS, The Internet Society, (2018)Collaborative Alert Ranking for Anomaly Detection., , , , , , and . CIKM, page 1987-1995. ACM, (2018)BeeZip: Towards An Organized and Scalable Architecture for Data Compression., , , and . ASPLOS (3), page 133-148. ACM, (2024)NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis., , , , , , , , , and . CCS, page 1324-1337. ACM, (2018)Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , and . AsiaCCS, page 8-9. ACM, (2012)Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , and . INFOCOM, page 1091-1099. IEEE, (2010)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , and . NDSS, The Internet Society, (2011)Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification., , , , , , , , and . SDM, page 693-701. SIAM, (2019)