Author of the publication

From Zygote to Morula: Fortifying Weakened ASLR on Android.

, , , , and . IEEE Symposium on Security and Privacy, page 424-439. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone., , , , and . IEEE Trans. Mob. Comput., 19 (6): 1434-1447 (2020)A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains., , , , , and . CoRR, (2019)PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications., , , , , , and . CODASPY, page 209-220. ACM, (2019)Protecting computer systems through eliminating or analyzing vulnerabilities.. Georgia Institute of Technology, Atlanta, GA, USA, (2017)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/58603).All Your Clicks Belong to Me: Investigating Click Interception on the Web., , , , and . USENIX Security Symposium, page 941-957. USENIX Association, (2019)SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing., , , and . SP, page 2104-2121. IEEE, (2023)Diagnosing Kernel Concurrency Failures with AITIA., , , , , and . EuroSys, page 94-110. ACM, (2023)Vessels: efficient and scalable deep learning prediction on trusted processors., , , , , , and . SoCC, page 462-476. ACM, (2020)Protecting location privacy using location semantics., , , and . KDD, page 1289-1297. ACM, (2011)SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities., , , and . CCS, page 1473-1487. ACM, (2022)