Author of the publication

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.

, , , and . NDSS, The Internet Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Summary-based routing for content-based event distribution networks., , , , , and . Comput. Commun. Rev., 34 (5): 59-74 (2004)Flight Data Recorder: Monitoring Persistent-State Interactions to Improve Systems Management., , , , , , , and . OSDI, page 117-130. USENIX Association, (2006)LiveOps: Systems Management as a Service., , , , and . LISA, page 187-203. USENIX, (2006)System Administration: Drowning in Management Complexity.. LISA, USENIX, (2006)Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting., , , , and . SRUTI, USENIX Association, (2006)STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support., , , , , , and . LISA, page 159-172. USENIX, (2003)Context-based Online Configuration-Error Detection., , , , and . USENIX Annual Technical Conference, USENIX Association, (2011)Towards a Self-Managing Software Patching Process Using Black-Box Persistent-State Manifests., , , , , and . ICAC, page 106-113. IEEE Computer Society, (2004)Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management., , , , , , and . LISA, page 33-46. USENIX, (2004)The Secret Lives of Computers Exposed: Flight Data Recorder for Windows.. login Usenix Mag., (2007)