Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experience with model-based performance, reliability, and adaptability assessment of a complex industrial architecture., , , , , , , , , and 5 other author(s). Softw. Syst. Model., 12 (4): 765-787 (2013)The design and implementation of dynamic information flow tracking systems for software security.. Stanford University, USA, (2010)Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor., , and . DSN, page 105-114. IEEE Computer Society, (2009)Thread-safe dynamic binary translation using transactional memory., , , and . HPCA, page 279-289. IEEE Computer Society, (2008)Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications., , and . USENIX Security Symposium, page 267-282. USENIX Association, (2009)Raksha: a flexible information flow architecture for software security., , and . ISCA, page 482-493. ACM, (2007)Tainting is not pointless., , and . ACM SIGOPS Oper. Syst. Rev., 44 (2): 88-92 (2010)Detecting software modularity violations., , , and . ICSE, page 411-420. ACM, (2011)Improving software security with a C pointer analysis., , , and . ICSE, page 332-341. ACM, (2005)Real-World Buffer Overflow Protection for Userspace and Kernelspace., , and . USENIX Security Symposium, page 395-410. USENIX Association, (2008)