Author of the publication

Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.

, , , , and . NDSS, The Internet Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosting performance in attack intention recognition by integrating multiple techniques., , , , and . Frontiers Comput. Sci. China, 5 (1): 109-118 (2011)Software structure characteristic measurement method based on weighted network., , , , and . Comput. Networks, (2019)Defeating buffer overflow attacks via virtualization., , , and . Comput. Electr. Eng., 40 (6): 1940-1950 (2014)Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model., , , , and . IEICE Trans. Inf. Syst., 93-D (12): 3410-3413 (2010)A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks., , , , and . Inf. Sci., (2019)A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments., , and . Secur. Commun. Networks, (2018)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)A Quantitative Method for Evaluating Network Security Based on Attack Graph., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 349-358. Springer, (2017)SulleyEX: A Fuzzer for Stateful Network Protocol., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 359-372. Springer, (2017)