Author of the publication

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.

, , , , , , , and . ASPLOS, page 2-13. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compatibility Is Not Transparency: VMM Detection Myths and Realities., , , and . HotOS, USENIX Association, (2007)Understanding Data Lifetime via Whole System Simulation, , , , and . Proc. 13$^th$ USENIX Security Symposium, (August 2004)http://www.stanford.edu/~talg/papers/USENIX04/taint-usenix04.pdf -- geprüft: 14.~Juli~2004.The Design and Evolution of Live Storage Migration in VMware ESX., , , and . USENIX Annual Technical Conference, USENIX Association, (2011)Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools.. NDSS, The Internet Society, (2003)The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing., , , , and . login Usenix Mag., (2020)Position Paper: Progressive Memory Safety for WebAssembly., , , , , and . HASP@ISCA, page 4:1-4:8. ACM, (2019)Data lifetime is a systems problem., , , and . ACM SIGOPS European Workshop, page 10. ACM, (2004)Traps and Pitfalls: Practical Problems in in System Call Interposition based Security Tools. #NDSS03#, (2003)When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments., and . HotOS, USENIX Association, (2005)Reducing shoulder-surfing by using gaze-based password entry., , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 13-19. ACM, (2007)