From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks., , , , и . CCS, стр. 1612-1626. ACM, (2021)FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis., , , , , и . ACSAC, стр. 733-745. ACM, (2020)MARDU: Efficient and Scalable Code Re-randomization., , , и . SYSTOR, стр. 49-60. ACM, (2020)A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems., и . WISA, том 13720 из Lecture Notes in Computer Science, стр. 185-203. Springer, (2022)Hacking in Darkness: Return-oriented Programming against Secure Enclaves., , , , , , , , и . USENIX Security Symposium, стр. 523-539. USENIX Association, (2017)Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity., , , , и . ASPLOS (3), стр. 283-300. ACM, (2024)GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation., , , , , , , , , и . SAC, стр. 1366-1375. ACM, (2024)Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset., , , и . Proc. Priv. Enhancing Technol., 2019 (1): 172-191 (2019)UCognito: Private Browsing without Tears., , , , и . ACM Conference on Computer and Communications Security, стр. 438-449. ACM, (2015)Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations., , , , , , , и . CCS, стр. 328-339. ACM, (2015)