From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication., , , , , и . CoRR, (2018)Exploitation Techniques and Defenses for Data-Oriented Attacks., , , , , , и . SecDev, стр. 114-128. IEEE, (2019)PAC it up: Towards Pointer Integrity using ARM Pointer Authentication., , , , , и . USENIX Security Symposium, стр. 177-194. USENIX Association, (2019)Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks., , , , , и . USENIX Security Symposium, стр. 1433-1450. USENIX Association, (2023)Camouflage: Hardware-assisted CFI for the ARM Linux kernel., , , и . CoRR, (2019)Hardware-assisted memory safety.. Aalto University, Espoo, Finland, (2020)base-search.net (ftaaltouniv:oai:aaltodoc.aalto.fi:123456789/42353).Authenticated Call Stack., , , и . DAC, стр. 223. ACM, (2019)PACStack: an Authenticated Call Stack., , , , и . USENIX Security Symposium, стр. 357-374. USENIX Association, (2021)Towards cryptographically-authenticated in-memory data structures., , , и . SecDev, стр. 30-44. IEEE, (2022)Camouflage: Hardware-assisted CFI for the ARM Linux kernel., , , и . DAC, стр. 1-6. IEEE, (2020)