Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools.. NDSS, The Internet Society, (2003)Understanding Data Lifetime via Whole System Simulation, , , , and . Proc. 13$^th$ USENIX Security Symposium, (August 2004)http://www.stanford.edu/~talg/papers/USENIX04/taint-usenix04.pdf -- geprüft: 14.~Juli~2004.Compatibility Is Not Transparency: VMM Detection Myths and Realities., , , and . HotOS, USENIX Association, (2007)Position Paper: Progressive Memory Safety for WebAssembly., , , , , and . HASP@ISCA, page 4:1-4:8. ACM, (2019)The Design and Evolution of Live Storage Migration in VMware ESX., , , and . USENIX ATC, USENIX Association, (2011)SANE: a protection architecture for enterprise networks, , , , , , and . Proceedings of the 15th conference on USENIX Security Symposium - Volume 15, Berkeley, CA, USA, (2006)Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation., , , and . USENIX Security Symposium, USENIX Association, (2005)Retrofitting Fine Grain Isolation in the Firefox Renderer., , , , , , , and . USENIX Security Symposium, page 699-716. USENIX Association, (2020)Gobi: WebAssembly as a Practical Path to Library Sandboxing., , , , and . CoRR, (2019)Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks., , and . NSDI, USENIX, (2006)