Author of the publication

Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers.

, , , , and . ASPLOS, page 263-276. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Operational Role of Security Information and Event Management Systems., , and . IEEE Secur. Priv., 12 (5): 35-41 (2014)Text Classification for Data Loss Prevention., , and . PETS, volume 6794 of Lecture Notes in Computer Science, page 18-37. Springer, (2011)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)An Attack Surface Metric., and . IEEE Trans. Software Eng., 37 (3): 371-386 (2011)Big data for security: challenges, opportunities, and examples.. BADGERS@CCS, page 3-4. ACM, (2012)eyeDNS: Monitoring a University Campus Network., , , , , and . ICC, page 1-7. IEEE, (2018)A Formal Model for a System's Attack Surface., and . Moving Target Defense, volume 54 of Advances in Information Security, Springer, (2011)Machine Learning for Enterprise Security.. AISec@CCS, page 1. ACM, (2015)Fast submatch extraction using OBDDs., , , , and . ANCS, page 163-174. ACM, (2012)A novel algorithm for pattern matching with back references., , , and . IPCCC, page 1-8. IEEE Computer Society, (2015)