Author of the publication

Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.

, , , and . ACM Conference on Computer and Communications Security, page 1551-1574. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , , and . ACM Trans. Priv. Secur., 22 (1): 2:1-2:31 (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , and . NDSS, The Internet Society, (2020)GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation., , , , and . USENIX Security Symposium, page 1883-1899. USENIX Association, (2023)Detecting SMS Spam in the Age of Legitimate Bulk Messaging., , , , and . WISEC, page 165-170. ACM, (2016)Trustworthy Whole-System Provenance for the Linux Kernel., , , and . USENIX Security Symposium, page 319-334. USENIX Association, (2015)ProXray: Protocol Model Learning and Guided Firmware Analysis., , , , and . IEEE Trans. Software Eng., 47 (9): 1907-1928 (2021)Securing SSL Certificate Verification through Dynamic Linking., , , , , , and . CCS, page 394-405. ACM, (2014)Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways., , , , , and . IEEE Symposium on Security and Privacy, page 339-356. IEEE Computer Society, (2016)Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks., , , and . ACM Conference on Computer and Communications Security, page 1551-1574. ACM, (2020)Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery., , , , , and . USENIX Security Symposium, page 5845-5861. USENIX Association, (2023)