Author of the publication

Parametric Verification of Address Space Separation.

, , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study of mass-mailing worms., , , and . WORM, page 1-10. ACM Press, (2004)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , and . ACM Conference on Computer and Communications Security, page 13-24. ACM, (2013)Device-Enabled Authorization in the Grey-System., , , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 431-445. Springer, (2005)Memoir: Practical State Continuity for Protected Modules., , , , and . IEEE Symposium on Security and Privacy, page 379-394. IEEE Computer Society, (2011)CLAMP: Practical Prevention of Large-Scale Data Leaks., , , , and . SP, page 154-169. IEEE Computer Society, (2009)Bootstrapping Trust in Commodity Computers., , and . IEEE Symposium on Security and Privacy, page 414-429. IEEE Computer Society, (2010)Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture., , , , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 141-165. Springer, (2010)Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)Towards Sound Detection of Virtual Machines., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)Trustworthy Execution on Mobile Devices., , and . Springer Briefs in Computer Science Springer, (2014)