Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , and . USENIX Security Symposium, page 973-988. USENIX Association, (2014)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 55-74. Springer, (2015)Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons., , , , , and . CoRR, (2021)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , and . ICSE-Companion, page 360-361. ACM/IEEE, (2022)Pileus: protecting user resources from vulnerable cloud services., , , and . ACSAC, page 52-64. ACM, (2016)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)GRIFFIN: Guarding Control Flows Using Intel Processor Trace., , and . ASPLOS, page 585-598. ACM, (2017)Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture., , and . CoRR, (2014)An Evil Copy: How the Loader Betrays You., , and . NDSS, The Internet Society, (2017)HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs., , , , , , and . CCS, page 366-378. ACM, (2021)