From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LMP: light-weighted memory protection with hardware assistance., , , и . ACSAC, стр. 460-470. ACM, (2016)BinPro: A Tool for Binary Source Code Provenance., , и . CoRR, (2017)Security Benchmarking using Partial Verification., , и . HotSec, USENIX Association, (2008)Unicorn: two-factor attestation for data security., , , и . ACM Conference on Computer and Communications Security, стр. 17-28. ACM, (2011)SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices., и . ACM Conference on Computer and Communications Security, стр. 1713-1714. ACM, (2015)Aion Attacks: Manipulating Software Timers in Trusted Execution Environment., , , и . DIMVA, том 12756 из Lecture Notes in Computer Science, стр. 173-193. Springer, (2021)FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers., , и . ASE, стр. 1061-1072. IEEE, (2023)Ex-vivo dynamic analysis framework for Android device drivers., , и . SP, стр. 1088-1105. IEEE, (2020)Manitou: a layer-below approach to fighting malware., и . ASID, стр. 6-11. ACM, (2006)Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices., и . IEEE Symposium on Security and Privacy, стр. 880-896. IEEE Computer Society, (2015)