Author of the publication

Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.

, , , , , , and . NDSS, The Internet Society, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Web Service Auditing via Network Provenance Functions., , , , , , , and . WWW, page 887-895. ACM, (2017)NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage., , , , , , and . NDSS, The Internet Society, (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , and . NDSS, The Internet Society, (2020)Fear and Logging in the Internet of Things., , , and . NDSS, The Internet Society, (2018)Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security., , , , and . TaPP, USENIX Association, (2017)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling., , , , and . USENIX ATC, page 97-109. USENIX Association, (2017)Can Data Provenance Put an End to the Data Breach?, and . IEEE Secur. Priv., 17 (4): 88-93 (2019)You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2020)