Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chimera: A Declarative Language for Streaming Network Traffic Analysis., , and . USENIX Security Symposium, page 365-379. USENIX Association, (2012)Securing sensitive content in a view-only file system., , and . Digital Rights Management Workshop, page 27-36. ACM, (2006)Spector: Automatically Analyzing Shell Code., , and . ACSAC, page 501-514. IEEE Computer Society, (2007)Protecting Confidential Data on Personal Computers with Storage Capsules., , , and . USENIX Security Symposium, page 367-382. USENIX Association, (2009)Web tap: detecting covert web traffic., and . CCS, page 110-120. ACM, (2004)Securing Network Input via a Trusted Input Proxy., and . HotSec, USENIX Association, (2007)SVGrid: a secure virtual environment for untrusted grid applications., , and . MGC@Middleware, page 2:1-2:6. ACM, (2005)Analyzing websites for user-visible security design flaws., , and . SOUPS, page 117-126. ACM, (2008)OpenFire: Using deception to reduce network attacks., , and . SecureComm, page 224-233. IEEE, (2007)Towards Protecting Sensitive Files in a Compromised System., , and . IEEE Security in Storage Workshop, page 21-28. IEEE Computer Society, (2005)