Author of the publication

SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.

, , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-211. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PTAD: Provable and Traceable Assured Deletion in Cloud Storage., , , and . ISCC, page 1-6. IEEE, (2019)T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 867-885 (2023)KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels., , , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 691-710. Springer, (2018)Discovering Universal Semantic Triggers for Text-to-Image Synthesis., , , , , and . CoRR, (2024)A Generalized Trusted Virtualized Platform Architecture., , and . ICYCS, page 2340-2346. IEEE Computer Society, (2008)Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 192-204. Springer, (2017)SeLance: Secure Load Balancing of Virtual Machines in Cloud., , , and . Trustcom/BigDataSE/ISPA, page 662-669. IEEE, (2016)Making least privilege the low-hanging fruit in clouds., , , , and . ICC, page 1-7. IEEE, (2017)A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS., , , , , and . CoRR, (2018)Android Multi-Level System Permission Management Approach., , , , and . CoRR, (2017)