Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling., , , , , , and . CoRR, (2023)CIVSCOPE: Analyzing Potential Memory Corruption Bugs in Compartment Interfaces., , , , , , , and . KISV@SOSP, page 33-40. ACM, (2023)Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software., , , , , and . CoRR, (2022)The Design and Implementation of a Verified File System with End-to-End Data Integrity., , , , and . CoRR, (2020)Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software., , , , , and . NDSS, The Internet Society, (2023)Lossless instruction-to-object memory tracing in the Linux kernel., , , , , , and . SYSTOR, page 2:1-2:12. ACM, (2021)Slipstream: Automatic Interprocess Communication Optimization., , , and . USENIX Annual Technical Conference, page 431-443. USENIX Association, (2015)MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation., , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 359-379. Springer, (2018)μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts., , , , , , , , , and 1 other author(s). RAID, page 296-311. ACM, (2021)Endoprocess: Programmable and Extensible Subprocess Isolation., , , , and . NSPW, page 92-101. ACM, (2023)