Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

: Comprehensive Sieve Analysis of Breakthrough HIV-1 Sequences in the RV144 Vaccine Efficacy Trial., , , , , , , , , and 24 other author(s). PLoS Comput. Biol., (2015)No-FAT: Architectural Support for Low Overhead Memory Safety Checks., , , , and . ISCA, page 916-929. IEEE, (2021)SPAM: Stateless Permutation of Application Memory., , and . CoRR, (2020)ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks., , , and . ISCA, page 999-1012. IEEE, (2021)FIRED: Frequent Inertial Resets with Diversification for Emerging Commodity Cyber-Physical Systems., , , and . CoRR, (2017)PAIRS: Control Flow Protection using Phantom Addressed Instructions., , , , and . CoRR, (2019)EPI: Efficient Pointer Integrity For Securing Embedded Systems., , , , and . SEED, page 163-175. IEEE, (2021)Bespoke Security for Resource Constrained Cyber-Physical Systems.. Columbia University, USA, (2021)Practical Byte-Granular Memory Blacklisting using Califorms., , , , , and . MICRO, page 558-571. ACM, (2019)Designing information communities for the 3D environment. Sponsored by SIG VIS, SIG DL., , , , , , and . ASIST, volume 39 of Proc. Assoc. Inf. Sci. Technol., page 518. Wiley, (2002)