Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Benchmarking Flaws in Systems Security., , , , and . EuroS&P, page 310-325. IEEE, (2019): Practical Cache Attacks from the Network., , , , , and . SP, page 20-38. IEEE, (2020)Now You See Me: Real-time Dynamic Function Call Detection., , , , and . ACSAC, page 618-628. ACM, (2018)VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching., , , , , , and . CoRR, (2020)ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks., , , , , , and . OSDI, page 697-710. USENIX Association, (2018)VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching., , , , , , and . ACSAC, page 97-112. ACM, (2019)Benchmarking Flaws Undermine Security Research., , , , and . IEEE Secur. Priv., 18 (3): 48-57 (2020)SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets., , , , , , and . IEEE Symposium on Security and Privacy, page 97-111. IEEE Computer Society, (2013)Compiler-Agnostic Function Detection in Binaries., , and . EuroS&P, page 177-189. IEEE, (2017)An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries., , , , and . USENIX Security Symposium, page 583-600. USENIX Association, (2016)