Author of the publication

MEDS: The Memory Error Detection System.

, , , and . ESSoS, volume 5429 of Lecture Notes in Computer Science, page 164-179. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MEDS: The Memory Error Detection System., , , and . ESSoS, volume 5429 of Lecture Notes in Computer Science, page 164-179. Springer, (2009)Evaluating trace cache energy efficiency., , and . ACM Trans. Archit. Code Optim., 3 (4): 450-476 (2006)Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge., , , , , , , , and . IEEE Secur. Priv., 16 (2): 42-51 (2018)A Framework for Creating Binary Rewriting Tools (Short Paper)., , , , , , , and . EDCC, page 142-145. IEEE Computer Society, (2014)The effects of context switching on branch predictor performance., and . ISPASS, page 77-84. IEEE Computer Society, (2001)Securing Binary Code., , , , and . IEEE Secur. Priv., 15 (6): 77-81 (2017)Mixr: Flexible Runtime Rerandomization for Binaries., , , , and . MTD@CCS, page 27-37. ACM, (2017)ILR: Where'd My Gadgets Go?, , , , and . IEEE Symposium on Security and Privacy, page 571-585. IEEE Computer Society, (2012)Zipr: Efficient Static Binary Rewriting for Security., , , , and . DSN, page 559-566. IEEE Computer Society, (2017)Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery., , , , , , , , , and 3 other author(s). CISRC, page 17:1-17:4. ACM, (2016)