From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion., , , и . SOSP, стр. 531-545. ACM, (2017)METAlloc: efficient and comprehensive metadata management for software security hardening., , , и . EUROSEC, стр. 5:1-5:6. ACM, (2016)Reliable Recon in Adversarial Peer-to-Peer Botnets., , и . Internet Measurement Conference, стр. 129-140. ACM, (2015)How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 405-421. Springer, (2016)SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript., , , , , и . USENIX Security Symposium, стр. 1001-1018. USENIX Association, (2021)Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities., , и . NDSS, The Internet Society, (2017)StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries., , , , и . NDSS, The Internet Society, (2015)Howard: A Dynamic Excavator for Reverse Engineering Data Structures., , и . NDSS, The Internet Society, (2011)LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating., , , и . RAID, стр. 62-77. ACM, (2021)On Sockets and System Calls: Minimizing Context Switches for the Socket API., , , и . TRIOS, USENIX Association, (2014)