From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks., , , , , , и . EuroS&P, стр. 167-182. IEEE, (2018)SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks., , , и . USENIX Security Symposium, USENIX Association, (2011)Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure., , , , , и . ESSoS, том 10379 из Lecture Notes in Computer Science, стр. 143-160. Springer, (2017)Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses., , , , , и . EuroS&P, стр. 366-381. IEEE, (2017)Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire., , , и . NDSS, The Internet Society, (2016)Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP., , , , , и . CCS, стр. 1803-1820. ACM, (2020)CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs., , , и . CODASPY, стр. 337-347. ACM, (2024)Trail of bytes: efficient support for forensic analysis., , и . ACM Conference on Computer and Communications Security, стр. 50-60. ACM, (2010)Identifying Code Injection and Reuse Payloads In Memory Error Exploits.. University of North Carolina, Chapel Hill, USA, (2014)base-search.net (ftcarolinadr:cdr.lib.unc.edu:5x21tg126).Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level., , , , и . CCS, стр. 2695-2709. ACM, (2023)