Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

deDacota: toward preventing server-side XSS via automatic code and data separation., , , , , and . ACM Conference on Computer and Communications Security, page 1205-1216. ACM, (2013)The Darknet and the Future of Content Protection., , , and . Digital Rights Management Workshop, volume 2696 of Lecture Notes in Computer Science, page 155-176. Springer, (2002)Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing., , , , , and . USENIX Security Symposium, page 557-574. USENIX Association, (2017)Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability., , , , , and . USENIX Security Symposium, page 391-408. USENIX Association, (2023)Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud., , , , , and . OSDI, page 247-267. USENIX Association, (2023)HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device., , and . SP, page 1791-1807. IEEE, (2022)A highly parallel algorithm to approximate MaxCut on distributed memory architectures., and . IPPS, page 113-117. IEEE Computer Society, (1995)The Darknet and the Future of Content Distribution, , , and . Microsoft, (November 2002)Fay: Extensible Distributed Tracing from Kernels to Clusters, , , , and . ACM Trans. Comput. Syst., 30 (4): 13:1--13:35 (November 2012)Spacelord: Private and Secure Smart Space Sharing., , , and . ACSAC, page 427-439. ACM, (2022)