Author of the publication

PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications.

, , , , , , and . CODASPY, page 209-220. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing., , , , , , , , and . USENIX Security Symposium, page 425-442. USENIX Association, (2019)Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone., , , , and . CODASPY, page 153-164. ACM, (2023)Detecting Malware Injection with Program-DNS Behavior., , , , , , , , , and 1 other author(s). EuroS&P, page 552-568. IEEE, (2020)A Temperature-Independent Transmitter IC for 5.8-GHz DSRC Applications., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 55-I (6): 1733-1741 (2008)A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security., , , , , , , , and . CoRR, (2019)FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation., , , , , and . ASPLOS (4), page 169-188. ACM, (2023)PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications., , , , , , and . CODASPY, page 209-220. ACM, (2019)CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality., , , , , and . AsiaCCS, page 651-656. ACM, (2015)Progressive processing of system-behavioral query., , , , and . ACSAC, page 378-389. ACM, (2019)Vessels: efficient and scalable deep learning prediction on trusted processors., , , , , , and . SoCC, page 462-476. ACM, (2020)