Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Changing the Game of Software Security., , , and . IEEE Secur. Priv., 16 (2): 10-11 (2018)Safe and efficient hybrid memory management for Java., , , , and . ISMM, page 81-92. ACM, (2015)Adoption Challenges of Code Randomization., and . MTD@CCS, page 45-49. ACM, (2020)Taming Parallelism in a Multi-Variant Execution Environment., , , , , and . EuroSys, page 270-285. ACM, (2017)Text Message Price Gouging: A Perfect Storm of Tacit Collusion.. JTHTL, 8 (1): 217-242 (2010)Computational mouse atlases and their application to automatic assessment of craniofacial dysmorphology caused by the Crouzon mutation fgfr2(c342y), , , , , , , , , and . J Anat, 211 (1): 37--52 (2007)DMON: A Distributed Heterogeneous N-Variant System., , , , , , and . CoRR, (2019)Diversity and information leaks., , , , and . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting., , , , and . EuroSec@EuroSys, page 41-47. ACM, (2021)A Statistical Model of Head Asymmetry in Infants with Deformational Plagiocephaly., , , , , , , , , and 2 other author(s). SCIA, volume 4522 of Lecture Notes in Computer Science, page 898-907. Springer, (2007)