Author of the publication

Rosemary: A Robust, Secure, and High-performance Network Operating System.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 78-89. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DNS-Based Botnet Detection.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Decentralized Peer-to-Peer Botnet Architectures., and . Advances in Information and Intelligent Systems, volume 251 of Studies in Computational Intelligence, Springer, (2009)The Image Game: Exploit Kit Detection Based on Recursive Convolutional Neural Networks., , and . IEEE Access, (2020)Optimus: association-based dynamic system call filtering for container attack surface reduction., , and . J. Cloud Comput., 13 (1): 71 (December 2024)Vulnerabilities of network OS and mitigation with state-based permission system., , , , and . Secur. Commun. Networks, 9 (13): 1971-1982 (2016)Impact of Emerging Hardware on Security and Privacy., , , and . IEEE Secur. Priv., 21 (3): 6-7 (May 2023)Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints., , , , , and . USENIX Security Symposium, page 2541-2557. USENIX Association, (2020)Towards complete node enumeration in a peer-to-peer botnet., , , , , , , , , and 1 other author(s). AsiaCCS, page 23-34. ACM, (2009)Revisiting the ARM Debug Facility for OS Kernel Security., and . DAC, page 110. ACM, (2019)Privilege Messaging: An Authorization Framework over Email Infrastructure., , and . LISA, page 1-16. USENIX, (2006)