Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting., , , , and . CoRR, (2020)A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks., , , , and . CCS, page 801-814. ACM, (2022)Randomization-based Defenses against Data-Oriented Attacks.. MTD@CCS, page 1-2. ACM, (2021)PKRU-safe: automatically locking down the heap between safe and unsafe languages., , , , , , , , and . EuroSys, page 132-148. ACM, (2022)Venerable Variadic Vulnerabilities Vanquished., , , , , , , and . USENIX Security Symposium, page 186-198. USENIX Association, (2017)NoJITsu: Locking Down JavaScript Engines., , , , , and . NDSS, The Internet Society, (2020)DNS Tunneling for Network Penetration., , , , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 65-77. Springer, (2012)CoDaRR: Continuous Data Space Randomization against Data-Only Attacks., , , , , and . AsiaCCS, page 494-505. ACM, (2020)Tightly-coupled self-debugging software protection., , , , and . SSPREW@ACSAC, page 7:1-7:10. ACM, (2016)Distributed Heterogeneous N-Variant Execution., , , , , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 217-237. Springer, (2020)