From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Obfuscation: Class Hierarchy Flattening., , , и . FPS, том 7743 из Lecture Notes in Computer Science, стр. 194-210. Springer, (2012)Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors., , , и . SP, стр. 45-60. IEEE Computer Society, (2009)Sharing is caring: secure and efficient shared memory support for MVEEs., , , , , и . EuroSys, стр. 99-116. ACM, (2022)Taming Parallelism in a Multi-Variant Execution Environment., , , , , и . EuroSys, стр. 270-285. ACM, (2017)Facilitating Investment Strategy Negotiations Through Logic., , , , , и . SSCI, стр. 103-108. IEEE, (2023)How professional hackers understand protected code while performing attack tasks., , , , , , и . ICPC, стр. 154-164. IEEE Computer Society, (2017)Software Protection as a Risk Analysis Process., , , , и . CoRR, (2020)Resilient Self-Debugging Software Protection., , , и . EuroS&P Workshops, стр. 606-615. IEEE, (2020)POSTER: A Measurement Framework to Quantify Software Protections., , , и . CCS, стр. 1505-1507. ACM, (2014)Obfuscating Windows DLLs., , , и . SPRO@ICSE, стр. 24-30. IEEE Computer Society, (2015)