Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)CoVE: Towards Confidential Computing on RISC-V Platforms., , , , , , , and . CF, page 315-321. ACM, (2023)Mitigating the Lying-Endpoint Problem in Virtualized Network Access Frameworks., , , and . DSOM, volume 4785 of Lecture Notes in Computer Science, page 135-146. Springer, (2007)Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI., , , , , , , , , and 2 other author(s). ASPLOS (3), page 266-281. ACM, (2023)Towards a Resilient Machine Learning Classifier - a Case Study of Ransomware Detection., and . CoRR, (2020)POSTER: Semi-supervised Classification for Dynamic Android Malware Detection., , , and . CCS, page 2479-2481. ACM, (2017)Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity., , and . HASP@ISCA, page 8:1-8:11. ACM, (2019)Security analysis of confidential-compute instruction set architecture for virtualized workloads., , , , , , , and . SEED, page 121-131. IEEE, (2021)Towards a Virtualization-enabled Framework for Information Traceability (VFIT)., and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing., , , , , , , , , and 2 other author(s). IEEE Micro, 44 (4): 70-79 (July 2024)