Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DMON: A Distributed Heterogeneous N-Variant System., , , , , , and . CoRR, (2019)Energy-Efficient DRAM Selective Refresh Technique with Page Residence in a Memory Hierarchy of Hardware-Managed TLB., , , , , and . IEICE Trans. Electron., 101-C (3): 170-182 (2018)BinRec: dynamic binary lifting and recompilation., , , , , , , , , and 2 other author(s). EuroSys, page 36:1-36:16. ACM, (2020)Applying frame layout to hardware design in FPGA for seamless support of cross calls in CPU-FPGA coupling architecture., , and . Microprocess. Microsystems, 35 (5): 462-472 (2011)Bytecode Corruption Attacks Are Real - And How to Defend Against Them., , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 326-348. Springer, (2018)PKRU-safe: automatically locking down the heap between safe and unsafe languages., , , , , , , , and . EuroSys, page 132-148. ACM, (2022)PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary., , , , , , , , , and . NDSS, The Internet Society, (2019)Hardware Assisted Randomization of Data., , , , , , , , , and 1 other author(s). RAID, volume 11050 of Lecture Notes in Computer Science, page 337-358. Springer, (2018)Hierarchical data structure-based timing controller design for plasma display panels., , , , , , and . ISCAS, page 4121-4124. IEEE, (2010)SoK: Sanitizing for Security., , , , , , and . IEEE Symposium on Security and Privacy, page 1275-1295. IEEE, (2019)