Author of the publication

From Trusted to Secure: Building and Executing Applications That Enforce System Security.

, , , and . USENIX Annual Technical Conference, page 205-218. USENIX, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible security configuration for virtual machines., , and . CSAW, page 35-44. ACM, (2008)Q-Floid: Android Malware detection with Quantitative Data Flow Graphs., , , and . SG-CRC, volume 14 of Cryptology and Information Security Series, page 13-25. IOS Press, (2016)An architecture for enforcing end-to-end access control over web applications., , , , , , , and . SACMAT, page 163-172. ACM, (2010)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Analysis of virtual machine system policies., , and . SACMAT, page 227-236. ACM, (2009)Integrity walls: finding attack surfaces from mandatory access control policies., , , , and . AsiaCCS, page 75-76. ACM, (2012)Flowfence: a denial of service defense system for software defined networking., , , and . GIIS, page 1-6. IEEE, (2015)Blockchain and artificial intelligence for network security., , and . Ann. des Télécommunications, 75 (3-4): 101-102 (2020)Jif-Based Verification of Information Flow Policies for Android Apps., , and . Int. J. Secur. Softw. Eng., 8 (1): 28-42 (2017)A logical specification and analysis for SELinux MLS policy., , , , and . SACMAT, page 91-100. ACM, (2007)