Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrofitting Applications with Provenance-Based Security Monitoring., , , , , , and . CoRR, (2016)Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats., , , , and . NDSS, The Internet Society, (2020)Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems., , , and . NDSS, The Internet Society, (2023)Emerging Threats in Internet of Things Voice Services., , , , , , and . IEEE Secur. Priv., 17 (4): 18-24 (2019)Valve: Securing Function Workflows on Serverless Computing Platforms., , , , , and . WWW, page 939-950. ACM / IW3C2, (2020)Transparent Web Service Auditing via Network Provenance Functions., , , , , , , and . WWW, page 887-895. ACM, (2017)Characterizing Everyday Misuse of Smart Home Devices., , , , , and . SP, page 2835-2849. IEEE, (2023)Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control., , and . EuroS&P, page 487-501. IEEE, (2022)Secure and Trustworthy Provenance Collection for Digital Forensics., , and . Digital Fingerprinting, Springer, (2016)Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , and . CoRR, (2022)