Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage., , , , , , , and . CoRR, (2023)InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android., , , , , , and . NDSS, The Internet Society, (2018)Transforming commodity security policies to enforce Clark-Wilson integrity., , , , , and . ACSAC, page 269-278. ACM, (2012)PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation., , , , and . USENIX Security Symposium, page 789-806. USENIX Association, (2020)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)Verifying System Integrity by Proxy., , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 179-200. Springer, (2012)PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems., , , , , , , , and . USENIX Security Symposium, page 2579-2596. USENIX Association, (2021)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)Process firewalls: protecting processes during resource access., , and . EuroSys, page 57-70. ACM, (2013)