From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HIMA: A Hypervisor-Based Integrity Measurement Agent., , , и . ACSAC, стр. 461-470. IEEE Computer Society, (2009)Automated Security Debugging Using Program Structural Constraints., , , и . ACSAC, стр. 453-462. IEEE Computer Society, (2007)Memsherlock: an automated debugger for unknown memory corruption vulnerabilities., , , и . ACM Conference on Computer and Communications Security, стр. 562-572. ACM, (2007)Non-Control-Data Attacks Are Realistic Threats., , и . USENIX Security Symposium, USENIX Association, (2005)WORM vs. WORM: preliminary study of an active counter-attack mechanism., , и . WORM, стр. 83-93. ACM Press, (2004)Remote attestation to dynamic system properties: Towards providing complete system integrity evidence., , , , и . DSN, стр. 115-124. IEEE Computer Society, (2009)