From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Top of the Heap: Efficient Memory Error Protection for Many Heap Objects., , , , , и . CoRR, (2023)SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers., , , и . CCS, стр. 749-763. ACM, (2021)Collaborative TCP sequence number inference attack: how to crack sequence number under a second., , и . CCS, стр. 593-604. ACM, (2012)Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK., , , , , , , , и . SP, стр. 650-665. IEEE, (2022)Multipath TCP traffic diversion attacks and countermeasures., , , , и . ICNP, стр. 1-10. IEEE Computer Society, (2017)The Taming of the Stack: Isolating Stack Data from Memory Errors., , , , , , и . NDSS, The Internet Society, (2022)A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel., , , , , и . USENIX Security Symposium, стр. 4211-4228. USENIX Association, (2023)App in the Middle: Demystify Application Virtualization in Android and its Security Threats., , , , , , , и . SIGMETRICS (Abstracts), стр. 75-76. ACM, (2019)Application level attacks on Connected Vehicle Protocols., , , , , и . RAID, стр. 459-471. USENIX Association, (2019)How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1701-1713. ACM, (2018)