Author of the publication

ProFactory: Improving IoT Security via Formalized Protocol Customization.

, , , , , , and . USENIX Security Symposium, page 3879-3896. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Live acquisition of main memory data from Android smartphones and smartwatches., , , , , and . Digital Investigation, (2017)vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation., , , and . SoCC, page 125-138. ACM, (2015)vPipe: Piped I/O Offloading for Efficient Data Movement in Virtualized Clouds., , , and . SoCC, page 27:1-27:13. ACM, (2014)Profiling self-propagating worms via behavioral footprinting., and . WORM, page 17-24. ACM Press, (2006)Towards an integrated multimedia service hosting overlay., and . ACM Multimedia, page 96-103. ACM, (2004)Challenges in supporting virtual infrastructures in the cloud.. VTDC@HPDC, page 19-20. ACM, (2011)CLUE: System trace analytics for cloud service performance diagnosis., , , , , , and . NOMS, page 1-9. IEEE, (2014)Policy-driven multifile distribution., , and . IWQoS, page 193-197. IEEE, (2004)CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality., , , , , and . AsiaCCS, page 651-656. ACM, (2015)E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities., , , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 161-175. Springer, (2004)