Author of the publication

Missing the Point(er): On the Effectiveness of Code Pointer Integrity.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 781-796. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)On the Effectiveness of Type-based Control Flow Integrity., , , , , and . ACSAC, page 28-39. ACM, (2018)On the Challenges of Effective Movement., , , , and . MTD@CCS, page 41-50. ACM, (2014)MTD'20: 7th ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 2137-2138. ACM, (2020)Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity., , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)Data diodes in support of trustworthy cyber infrastructure., and . CSIIRW, page 23. ACM, (2010)TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems., , , , , , , and . RTSS, page 469-481. IEEE, (2021)Conware: Automated Modeling of Hardware Peripherals., , , , , , , , and . AsiaCCS, page 95-109. ACM, (2021)Timely Rerandomization for Mitigating Memory Disclosures., , , , and . ACM Conference on Computer and Communications Security, page 268-279. ACM, (2015)Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation.. MTD@CCS, page 55. ACM, (2015)