Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization., , , , , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 162-180. Springer, (2010)Scalable integrity monitoring in virtualized environments., , , and . STC@CCS, page 73-78. ACM, (2010)Comprehensive and Efficient Protection of Kernel Control Data., , , , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1404-1417 (2011)Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots., and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 209-226. Springer, (2011)DKSM: Subverting Virtual Machine Introspection for Fun and Profit., , , , , , , and . SRDS, page 82-91. IEEE Computer Society, (2010)Process out-grafting: an efficient öut-of-VM" approach for fine-grained process execution monitoring., , , and . ACM Conference on Computer and Communications Security, page 363-374. ACM, (2011)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 40-47 (2008)Performance Analysis of Multi-dimensional Packet Classification on Programmable Network Processors., and . LCN, page 360-367. IEEE Computer Society, (2004)