From post

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.

, , , и . ESORICS (2), том 8713 из Lecture Notes in Computer Science, стр. 475-493. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment., , , и . ESORICS (2), том 8713 из Lecture Notes in Computer Science, стр. 475-493. Springer, (2014)Secure Cryptography Infrastructures in the Cloud., , , , , , и . GLOBECOM, стр. 1-7. IEEE, (2019)A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity., , , , и . ICICS, том 10631 из Lecture Notes in Computer Science, стр. 105-117. Springer, (2017)Towards Fine-Grained Access Control on Browser Extensions., , , и . ISPEC, том 7232 из Lecture Notes in Computer Science, стр. 158-169. Springer, (2012)How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack., , , , и . ISC, том 10599 из Lecture Notes in Computer Science, стр. 269-287. Springer, (2017)MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks., , , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Android Control Flow Obfuscation Based on Dynamic Entry Points Modification., , , , и . CSCS, стр. 296-303. IEEE, (2019)KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation., , , , и . ISCC, стр. 1-6. IEEE, (2019)A PUF and Software Collaborative Key Protection Scheme., , , , и . ICICS, том 10631 из Lecture Notes in Computer Science, стр. 291-303. Springer, (2017)Implementation of High Throughput XTS-SM4 Module for Data Storage Devices., , , , и . SecureComm (2), том 255 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 271-290. Springer, (2018)