Author of the publication

Architectural Supports to Protect OS Kernels from Code-Injection Attacks.

, , , , , and . HASP@ISCA, page 5:1-5:8. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Built Environment and Crime in a South Korea Context, and . Civil Engineering and Urban Planning: An International Journal (CiVEJ), 9 (1): 1 to 19 (March 2022)A hardware-based technique for efficient implicit information flow tracking., , , , , , and . ICCAD, page 94. ACM, (2016)Study on Intel CPU-FPGA Architecture : Security Perspective.. ISOCC, page 52-53. IEEE, (2018)Architectural Supports to Protect OS Kernels from Code-Injection Attacks., , , , , and . HASP@ISCA, page 5:1-5:8. ACM, (2016)Exploiting Both Pipelining and Data Parallelism with SIMD Reconfigurable Architecture., , , , , and . ARC, volume 7199 of Lecture Notes in Computer Science, page 40-52. Springer, (2012)Vision and Action in the Language-Ready Brain: From Mirror Neurons to SemRep., and . BVAI, volume 4729 of Lecture Notes in Computer Science, page 104-123. Springer, (2007)Hyperspectral Remote Temperature Estimation Robust to Atmospheric Variation with Fourier Transform Infrared and Deep Learning., , , and . MLDM (2), page 743-747. ibai Publishing, (2019)Extrax: security extension to extract cache resident information for snoop-based external monitors., , , , and . DATE, page 151-156. ACM, (2015)A Conceptual Design for Threat Detection System in UAM Vertiport Using Video Recognition and Flight Data., , , and . HCI (60), volume 2118 of Communications in Computer and Information Science, page 302-310. Springer, (2024)Improving performance of loops on DIAM-based VLIW architectures., , , and . LCTES, page 135-144. ACM, (2014)