From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage., , , , , , , и . CoRR, (2023)InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android., , , , , , и . NDSS, The Internet Society, (2018)Transforming commodity security policies to enforce Clark-Wilson integrity., , , , , и . ACSAC, стр. 269-278. ACM, (2012)PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation., , , , и . USENIX Security Symposium, стр. 789-806. USENIX Association, (2020)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , и . SERVICES, стр. 239-246. IEEE Computer Society, (2013)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , и . IEEE Symposium on Security and Privacy, стр. 304-319. IEEE Computer Society, (2017)JIGSAW: Protecting Resource Access by Inferring Programmer Expectations., , , и . USENIX Security Symposium, стр. 973-988. USENIX Association, (2014)Integrity walls: finding attack surfaces from mandatory access control policies., , , , и . AsiaCCS, стр. 75-76. ACM, (2012)Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer., , , , , и . SPACE, том 9354 из Lecture Notes in Computer Science, стр. 55-74. Springer, (2015)Analysis of virtual machine system policies., , и . SACMAT, стр. 227-236. ACM, (2009)