Author of the publication

Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker.

, , , , , and . Trustcom/BigDataSE/ISPA, page 630-637. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PTAD: Provable and Traceable Assured Deletion in Cloud Storage., , , and . ISCC, page 1-6. IEEE, (2019)Discovering Universal Semantic Triggers for Text-to-Image Synthesis., , , , , and . CoRR, (2024)T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 867-885 (2023)KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels., , , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 691-710. Springer, (2018)A Generalized Trusted Virtualized Platform Architecture., , and . ICYCS, page 2340-2346. IEEE Computer Society, (2008)Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 192-204. Springer, (2017)Android Multi-Level System Permission Management Approach., , , , and . CoRR, (2017)A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS., , , , , and . CoRR, (2018)SeLance: Secure Load Balancing of Virtual Machines in Cloud., , , and . Trustcom/BigDataSE/ISPA, page 662-669. IEEE, (2016)A Way of Key Management in Cloud Storage Based on Trusted Computing., , , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)