Author of the publication

ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.

, , , , , , and . VEE, page 143-156. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Serverless Multi-Query Motion Planning for Fog Robotics., , , , , and . ICRA, page 7457-7463. IEEE, (2021)SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation., , , , , , , , and . SP, page 592-607. IEEE, (2020)Dynamic register promotion of stack variables., , and . CGO, page 21-31. IEEE Computer Society, (2011)Synchronization Identification through On-the-Fly Test., , , , , , and . Euro-Par, volume 8097 of Lecture Notes in Computer Science, page 4-15. Springer, (2013)CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation., , , , , , , and . CCS, page 2989-3002. ACM, (2022)Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths., , , , , , and . USENIX Security Symposium, page 4365-4382. USENIX Association, (2022)FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods., , , , , , , , and . CoRR, (2022)Anna: A KVS for Any Scale., , , and . IEEE Trans. Knowl. Data Eng., 33 (2): 344-358 (2021)SysMon: Monitoring Memory Behaviors via OS Approach., , , , and . APPT, volume 10561 of Lecture Notes in Computer Science, page 51-63. Springer, (2017)HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines., , , , , , , and . VEE, page 53-64. ACM, (2015)