Author of the publication

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.

, , and . NDSS, The Internet Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The sybil attack in sensor networks: analysis & defenses., , , and . IPSN, page 259-268. ACM, (2004)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , and . ACM Conference on Computer and Communications Security, page 13-24. ACM, (2013)Replayer: automatic protocol replay by binary analysis., , , and . CCS, page 311-321. ACM, (2006)Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)Sting: An End-to-End Self-Healing System for Defending against Internet Worms., , and . Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Trustworthy Execution on Mobile Devices., , and . Springer Briefs in Computer Science Springer, (2014)Paragraph: Thwarting Signature Learning by Training Maliciously., , and . RAID, volume 4219 of Lecture Notes in Computer Science, page 81-105. Springer, (2006)Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation, , , , and . #SEC07#, (2007)Co-opting Linux Processes for High-Performance Network Simulation., , and . USENIX Annual Technical Conference, page 327-350. USENIX Association, (2022)Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software., , and . NDSS, The Internet Society, (2006)