Author of the publication

Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.

, , , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 3-19. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Treasure and tragedy in kmem_cache mining for live forensics investigation., , , and . Digit. Investig., 7 (Supplement): S41-S47 (2010)A Distributed Graphics Library System., , , , and . Softw. Pract. Exp., 24 (4): 363-376 (1994)Message from the Program Co-Chairs., and . IPCCC, page iv. IEEE, (2004)Proteus: A Scalable BFT Consensus Protocol for Blockchains., , and . Blockchain, page 308-313. IEEE, (2019)Consistent BFT Performance for Blockchains., , and . DSN (Supplements), page 17-18. IEEE, (2019)Reliable Group Communication in an Ad Hoc Network., and . LCN, page 458-459. IEEE Computer Society, (2002)Automatically Creating Realistic Targets for Digital Forensics Investigation., , and . DFRWS, (2005)Scalpel: A Frugal, High Performance File Carver., and . DFRWS, (2005)DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction., , , and . RAID, page 547-559. USENIX Association, (2019)File System Support for Digital Evidence Bags., and . IFIP Int. Conf. Digital Forensics, volume 222 of IFIP Advances in Information and Communication Technology, page 29-40. Springer, (2006)