Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices., and . CoRR, (2018)Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution., and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines., , , , and . NDSS, The Internet Society, (2015)A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 322-336. Springer, (2011)Speculative Probing: Hacking Blind in the Spectre Era., , , , and . CCS, page 1871-1885. ACM, (2020)Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access., , and . CoRR, (2018)Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation., , and . EuroSys, page 15-27. ACM, (2006)Paranoid Android: versatile protection for smartphones., , , and . ACSAC, page 347-356. ACM, (2010)Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure., , , , , , , and . EuroS&P, page 227-242. IEEE, (2018)Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries., , , , , , and . CoRR, (2021)