Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ret2dir: Rethinking Kernel Isolation., , and . USENIX Security Symposium, page 957-972. USENIX Association, (2014)Quantifying Application Behavior Space for Detection and Self-Healing, , , , and . CUCS-017-06. Columbia University, (2006)FLIPS: Hybrid Adaptive Intrustion Prevention, , , and . #RAID05#, (2005)Countering Network Worms Through Automatic Patch Generation, and . CUCS-029-03. Columbia University Department of Computer Science, (2003)Baiting Inside Attackers Using Decoy Documents., , , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-70. Springer, (2009)Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks., , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 41-50. Springer, (2009)Redirect2Own: Protecting the Intellectual Property of User-uploaded Content through Off-site Indirect Access., , and . CoRR, (2018)Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators., , , , , , , and . USENIX Security Symposium, page 5307-5324. USENIX Association, (2023)BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs., , and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 193-207. Springer, (2009)SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities., , , and . CCS, page 2155-2168. ACM, (2017)