Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks., , , and . DSOM, volume 4785 of Lecture Notes in Computer Science, page 135-146. Springer, (2007)Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI., , , , , , , , , and 2 other author(s). ASPLOS (3), page 266-281. ACM, (2023)CoVE: Towards Confidential Computing on RISC-V Platforms., , , , , , , and . CF, page 315-321. ACM, (2023)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)Towards a Virtualization-enabled Framework for Information Traceability (VFIT)., and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity., , and . HASP@ISCA, page 8:1-8:11. ACM, (2019)Security analysis of confidential-compute instruction set architecture for virtualized workloads., , , , , , , and . SEED, page 121-131. IEEE, (2021)HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection., , and . IEEE Symposium on Security and Privacy Workshops, page 109-115. IEEE Computer Society, (2018)Protocol Decode Based Stateful Firewall Policy Definition Language., , and . POLICY, page 201-. IEEE Computer Society, (2004)Swivel: Hardening WebAssembly against Spectre., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1433-1450. USENIX Association, (2021)