Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COMS: Customer Oriented Migration Service., , , and . CLOUD, page 692-695. IEEE Computer Society, (2017)HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code., , , and . ICAC, page 127-136. IEEE Computer Society, (2016)All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability., , , and . RAID, page 623-638. ACM, (2023)Understanding the Security Implication of Aborting Virtual Machine Live Migration., , , and . IEEE Trans. Cloud Comput., 10 (2): 1275-1286 (2022)Exploiting CPU Clock Modulation for Covert Communication Channel., , and . CoRR, (2024)Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds., , , and . IEEE Trans. Cloud Comput., 9 (1): 401-413 (2021)Understanding the Manipulation on Recommender Systems through Web Injection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)A covert channel construction in a virtualized environment., , , and . CCS, page 1040-1042. ACM, (2012)Kernel Data Attack Is a Realistic Security Threat., , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 135-154. Springer, (2015)CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution., , , , and . ICDCS, page 84-95. IEEE, (2023)