Author of the publication

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.

, , , , , , , , , , and . CCS, page 764-778. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's (Not) Validating Network Paths: A Survey., , , , , and . CoRR, (2018)Securing middlebox policy enforcement in SDN., , , , , and . Comput. Networks, (2021)Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation., , , , , , and . ACM Comput. Surv., 53 (5): 104:1-104:34 (2021)Security Challenges in the Container Cloud., , , , and . TPS-ISA, page 137-145. IEEE, (2021)Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 403-418 (January 2024)ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels., , , , , and . CoRR, (2019)Demystifying Pointer Authentication on Apple M1., , , , , , , and . USENIX Security Symposium, page 2833-2848. USENIX Association, (2023)Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms., , , , , , , , and . ACSAC, page 869-880. ACM, (2022)Fastlane-ing more flows with less bandwidth for software-Defined networking., , , , , and . Comput. Networks, (2018)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , and 1 other author(s). CCS, page 764-778. ACM, (2021)