Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-as-a-Service for Microservices-Based Cloud Applications., , and . CloudCom, page 50-57. IEEE Computer Society, (2015)Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference., , , and . USENIX Security Symposium, page 6007-6024. USENIX Association, (2023)Security Namespace: Making Linux Security Frameworks Available to Containers., , , , , and . USENIX Security Symposium, page 1423-1439. USENIX Association, (2018)Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning., , , , , , and . IoTDI, page 104-115. IEEE, (2020)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . ACSAC, page 181-190. ACM, (2015)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)Design and Implementation of Dual AIK Signing Scheme in Virtual TPM., , and . PAAP, page 183-187. IEEE Computer Society, (2010)Inevitable Failure: The Flawed Trust Assumption in the Cloud., , and . CCSW, page 141-150. ACM, (2014)Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps., , , and . USENIX Security Symposium, page 1151-1167. USENIX Association, (2019)