Author of the publication

Large-Scale Automated Software Diversity - Program Evolution Redux.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 158-171 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A configurable protocol architecture for CORBA environments., and . ISADS, page 187-194. IEEE Computer Society, (1997)Security/Trustworthiness Assessment of Platforms., and . Digital Privacy - PRIME, volume 6545 of Lecture Notes in Computer Science, Springer, (2011)A Customizable Reputation-based Privacy Assurance System using Active Feedback., and . SecureComm, page 1-8. IEEE, (2006)Enforcing determinism in a CSMA/CD local area network., , and . Microprocessing and Microprogramming, 26 (3): 205-211 (1989)CoDaRR: Continuous Data Space Randomization against Data-Only Attacks., , , , , and . AsiaCCS, page 494-505. ACM, (2020)A uniform approach to configuration and communication in distributed systems., and . CDS, page 144-151. IEEE, (1996)Trust in PRIME, , , , , , , and . Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., page 552--559. IEEE, (2005)Diversity and information leaks., , , , and . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)Enhancing and Extending Software Diversity.. University of California, Irvine, USA, (2015)Constructing distributed Unix utilities in Regis., and . CDS, page 183-189. IEEE Computer Society, (1994)