Author of the publication

Practical and Effective Sandboxing for Non-root Users.

, and . USENIX ATC, page 139-144. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Enforcement of Application Security Policies Using Tagged Memory., , , and . OSDI, page 225-240. USENIX Association, (2008)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , and . NSDI, page 157-172. USENIX Association, (2014)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)Verifying vMVCC, a high-performance transaction library using multi-version concurrency control., , , , , and . OSDI, page 871-886. USENIX Association, (2023)Nail: A Practical Tool for Parsing and Generating Data Formats., and . OSDI, page 615-628. USENIX Association, (2014)Groove: Flexible Metadata-Private Messaging., , , , and . OSDI, page 735-750. USENIX Association, (2022)Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning., , , , and . OSDI, page 447-463. USENIX Association, (2022)VerSum: Verifiable Computations over Large Public Logs., , and . ACM Conference on Computer and Communications Security, page 1304-1316. ACM, (2014)Aardvark: A Concurrent Authenticated Dictionary with Short Proofs., , , , and . IACR Cryptol. ePrint Arch., (2020)Systematic Analysis of Defenses against Return-Oriented Programming., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 82-102. Springer, (2013)