Author of the publication

Counteracting Data-Only Malware with Code Pointer Examination.

, , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 177-197. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots., , , , and . RAID, page 214-231. ACM, (2022)Malicious Bits and How to Fight Them.. Technical University of Munich, Germany, (2022)Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 263-277. Springer, (2018)Autocorrelation-Based Detection of Infinite Loops at Runtime., , and . DASC/PiCom/DataCom/CyberSciTech, page 368-375. IEEE Computer Society, (2016)