Author of the publication

Obfuscation and Diversification for Securing Cloud Computing.

, , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 179-202. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization., , , and . CoRR, (2018)Obfuscation and Diversification for Securing Cloud Computing., , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 179-202. Springer, (2015)A semantic security framework and context-aware role-based access control ontology for smart spaces., , , and . SBD@SIGMOD, page 8. ACM, (2016)Interface diversification in IoT operating systems., , , , and . UCC, page 304-309. ACM, (2016)Symbol diversification of linux binaries., , , , , and . WorldCIS, page 74-79. IEEE, (2014)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , and . Inf. Softw. Technol., (2018)Internal Interface Diversification as a Security Measure in Sensor Networks., , , , , , and . J. Sens. Actuator Networks, 7 (1): 12 (2018)Measuring Software Security from the Design of Software., , , and . CompSysTech, page 179-186. ACM, (2017)A Survey on Aims and Environments of Diversification and Obfuscation in Software Security., , , , , , and . CompSysTech, page 113-120. ACM, (2016)Diversification of System Calls in Linux Binaries., , , , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 15-35. Springer, (2014)