Author of the publication

Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services.

, , and . CANDAR, page 635-641. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services., , and . CANDAR, page 635-641. IEEE Computer Society, (2016)Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites., , and . CANDAR (Workshops), page 328-333. IEEE, (2020)Virtual Machine Monitor-based Hiding Method for Access to Debug Registers., , and . CANDAR, page 209-214. IEEE, (2020)VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss., and . ARES, volume 6908 of Lecture Notes in Computer Science, page 176-190. Springer, (2011)Evaluation of Processing Distribution for Application Program and OS in Microkernel OS., , and . CANDAR Workshops, page 440-444. IEEE, (2019)Design of Function for Tracing Diffusion of Classified Information for IPC on KVM., , , and . J. Inf. Process., 24 (5): 781-792 (2016)Web access monitoring mechanism for Android webview., , , , and . ACSW, page 1:1-1:8. ACM, (2018)Complicating Process Identification by Replacing Process Information for Attack Avoidance., and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 33-47. Springer, (2014)Secure and Fast Log Transfer Mechanism for Virtual Machine., and . J. Inf. Process., 22 (4): 597-608 (2014)Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection., , , and . IIAI-AAI, page 113-117. IEEE, (2022)