Author of the publication

An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.

, , , , and . ICCNS, page 6-10. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing wind/solar combinations at finer scales to mitigate renewable energy variability in China, , , , , , , , , and 3 other author(s). Renewable and Sustainable Energy Reviews, (2020)PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot., , , , , , , , and . CoRR, (2022)A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices., , , , , , , and . CoRR, (2021)Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem., , , , , , , and . CoRR, (2023)TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum., , , , , , , , and . CCS, page 120-134. ACM, (2023)Exploring the Reproducibility of Probabilistic Causal Molecular Network Models>., , , , , , , , and . PSB, page 120-131. (2017)An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3501-3514 (July 2024)Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem., , , , , , , and . ICSE, page 24:1-24:13. ACM, (2024)A Comprehensive Study on ARM Disassembly Tools., , , , , , , , and . IEEE Trans. Software Eng., 49 (4): 1683-1703 (April 2023)VeriReach: A Formally Verified Algorithm for Reachability Analysis in Virtual Private Cloud Networks., , , , and . ICWS, page 71-77. IEEE, (2023)