Author of the publication

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.

, , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs., , , , , , and . CCS, page 366-378. ACM, (2021)An Evil Copy: How the Loader Betrays You., , and . NDSS, The Internet Society, (2017)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)GRIFFIN: Guarding Control Flows Using Intel Processor Trace., , and . ASPLOS, page 585-598. ACM, (2017)An SVD-based Collaborative Filtering approach to alleviate cold-start problems., and . FSKD, page 1474-1477. IEEE, (2012)A 0D-3D multi-scale model of the portal venous system coupled with the entire cardiovascular system applied to predict postsplenectomy hemodynamic metrics., , , , , and . EMBC, page 1-4. IEEE, (2023)