Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal virtualization requirements for the ARM architecture., , , , and . J. Syst. Archit., 59 (3): 144-154 (2013)Protecting Your Software Updates., , and . IEEE Secur. Priv., 11 (2): 47-54 (2013)ΔBreakpad: Diversified Binary Crash Reporting., , , , and . CoRR, (2017)Sifting out the mud: low level C++ code reuse., , and . OOPSLA, page 275-291. ACM, (2002)SIGPLAN Notices 37(11).Steganography for Executables and Code Transformation Signatures., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 425-439. Springer, (2004)Attack simulation based software protection assessment method., , , , , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Software piracy prevention through diversity., , and . Digital Rights Management Workshop, page 63-71. ACM, (2004)Hybrid static-dynamic attacks against software protection mechanisms., , , and . Digital Rights Management Workshop, page 75-82. ACM, (2005)An FPGA-Based Real-Time Event Sampler., , , and . ARC, volume 5992 of Lecture Notes in Computer Science, page 364-371. Springer, (2010)Link-Time Optimization of IA64 Binaries., , , , and . Euro-Par, volume 3149 of Lecture Notes in Computer Science, page 284-291. Springer, (2004)