Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible and efficient memory object metadata., and . ISMM, page 36-46. ACM, (2017)Shielding Software From Privileged Side-Channel Attacks., , , , and . USENIX Security Symposium, page 1441-1458. USENIX Association, (2018)Baggy Bounds with Accurate Checking., , , , and . ISSRE Workshops, page 195-200. IEEE Computer Society, (2012)Refactoring the FreeBSD Kernel with Checked C., , , and . SecDev, page 15-22. IEEE, (2020)Jinn: Hijacking Safe Programs with Trojans., and . USENIX Security Symposium, page 6965-6982. USENIX Association, (2023)Virtual ghost: protecting applications from hostile operating systems., , and . ASPLOS, page 81-96. ACM, (2014)Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation., , , , and . ASPLOS, page 191-206. ACM, (2015)A Software Solution for Hardware Vulnerabilities., , and . SecDev, page 27-33. IEEE Computer Society, (2017)KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels., , and . IEEE Symposium on Security and Privacy, page 292-307. IEEE Computer Society, (2014)Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries., , , , , , and . USENIX ATC, page 489-504. USENIX Association, (2019)