From post

SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization.

, , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 224-242. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization., , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 224-242. Springer, (2019)Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes., , , , и . SAFECOMP Workshops, том 12853 из Lecture Notes in Computer Science, стр. 105-116. Springer, (2021)A Guided Search for Races Based on Data Flow Patterns., , , , и . SAFECOMP Workshops, том 13415 из Lecture Notes in Computer Science, стр. 47-58. Springer, (2022)Comparative Evaluation of Security Fuzzing Approaches., , , и . SAFECOMP Workshops, том 11699 из Lecture Notes in Computer Science, стр. 49-61. Springer, (2019)