Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Buffer Overflow Attacks.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned., , , and . BADGERS@ESORICS, page 18-29. IEEE, (2014)Tug-of-War: Observations on Unified Content Handling., , , , , and . CoRR, (2017)Privacy as an Operating System Service., , and . HotSec, USENIX Association, (2006)How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints., , , and . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)ASSURE: automatic software self-healing using rescue points., , , , , and . ASPLOS, page 37-48. ACM, (2009)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , and . ACSAC, page 416-425. ACM, (2014)Self-healing multitier architectures using cascading rescue points., , and . ACSAC, page 379-388. ACM, (2012)libdft: practical dynamic data flow tracking for commodity systems., , , and . VEE, page 121-132. ACM, (2012)That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms., , and . WPES@CCS, page 71-81. ACM, (2016)