Author of the publication

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.

, , , , and . CLOUD, page 253-260. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . CoRR, (2016)Security-as-a-Service for Microservices-Based Cloud Applications., , and . CloudCom, page 50-57. IEEE Computer Society, (2015)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)AuDroid: Preventing Attacks on Audio Channels in Mobile Devices., , , and . ACSAC, page 181-190. ACM, (2015)Inevitable Failure: The Flawed Trust Assumption in the Cloud., , and . CCSW, page 141-150. ACM, (2014)Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps., , , and . USENIX Security Symposium, page 1151-1167. USENIX Association, (2019)Design and Implementation of Dual AIK Signing Scheme in Virtual TPM., , and . PAAP, page 183-187. IEEE Computer Society, (2010)AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings., , , , and . USENIX Security Symposium, page 379-396. USENIX Association, (2017)EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs., , , , , and . USENIX Security Symposium, page 567-584. USENIX Association, (2019)Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services., , , , and . CLOUD, page 253-260. IEEE Computer Society, (2015)