Author of the publication

Parametric Verification of Address Space Separation.

, , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture., , , , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 141-165. Springer, (2010)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Cobra: Fine-grained Malware Analysis using Stealth Localized-executions., and . S&P, page 264-279. IEEE Computer Society, (2006)Re-inforced stealth breakpoints.. CRiSIS, page 59-66. IEEE, (2009)XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms., , and . HICSS, page 1-10. IEEE Computer Society, (2011)SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation., and . ACSC, volume 48 of CRPIT, page 311-320. Australian Computer Society, (2006)Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, , , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 159-178. Springer, (2012)Towards verifiable resource accounting for outsourced computation., , , , and . VEE, page 167-178. ACM, (2013)A High Performance Kernel-Less Operating System Architecture., , and . ACSC, volume 38 of CRPIT, page 287-296. Australian Computer Society, (2005)