Author of the publication

Hopper: Modeling and Detecting Lateral Movement.

, , , , , , and . USENIX Security Symposium, page 3093-3110. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Towards a privacy measurement criterion for voting systems., , , and . DG.O, volume 89 of ACM International Conference Proceeding Series, page 287-288. Digital Government Research Center, (2005)Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)., , and . CQRE, volume 1740 of Lecture Notes in Computer Science, page 192-203. Springer, (1999)Control-Flow Bending: On the Effectiveness of Control-Flow Integrity., , , , and . USENIX Security Symposium, page 161-176. USENIX Association, (2015)Cryptanalysis of an Algebraic Privacy Homomorphism.. ISC, volume 2851 of Lecture Notes in Computer Science, page 234-239. Springer, (2003)ROP is Still Dangerous: Breaking Modern Defenses., and . USENIX Security Symposium, page 385-399. USENIX Association, (2014)Fault Attacks on Dual-Rail Encoded Systems., and . ACSAC, page 483-494. IEEE Computer Society, (2005)From Weak to Strong Watermarking., , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 362-382. Springer, (2007)Towards a Unifying View of Block Cipher Cryptanalysis.. FSE, volume 3017 of Lecture Notes in Computer Science, page 16-33. Springer, (2004)