Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 426-446. Springer, (2014)Harbormaster: Policy Enforcement for Containers., , and . CloudCom, page 355-362. IEEE Computer Society, (2015)Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data., , , , and . ACSAC, page 449-460. ACM, (2017)Practical study of a defense against low-rate TCP-targeted DoS attack.. ICITST, page 1-6. IEEE, (2009)The Case of Adversarial Inputs for Secure Similarity Approximation Protocols., and . EuroS&P, page 247-262. IEEE, (2019)The Provenance of WINE., and . EDCC, page 126-131. IEEE Computer Society, (2012)Building a High-performance Deduplication System., and . USENIX Annual Technical Conference, USENIX Association, (2011)Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis., and . LEET, USENIX Association, (2012)Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs., and . IACR Cryptology ePrint Archive, (2017)File routing middleware for cloud deduplication.. CloudCP@EuroSys, page 10:1-10:6. ACM, (2012)