Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocol Responsibility Offloading to Improve TCP Throughput in Virtualized Environments., , , and . ACM Trans. Comput. Syst., 31 (3): 7 (2013)A Practical Approach for Adaptive Data Structure Layout Randomization., , , , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 69-89. Springer, (2015)Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis., , and . IPSN, page 348-355. IEEE, (2005)Exposing New Vulnerabilities of Error Handling Mechanism in CAN., , , , and . USENIX Security Symposium, page 4241-4258. USENIX Association, (2021)ATLAS: A Sequence-based Learning Approach for Attack Investigation., , , , , , , and . USENIX Security Symposium, page 3005-3022. USENIX Association, (2021)SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening., , , and . USENIX Security Symposium, page 2435-2452. USENIX Association, (2021)Evading Voltage-Based Intrusion Detection on Automotive CAN., , , , , and . NDSS, The Internet Society, (2021)ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2021)Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch., , , , , , , , and . MobiSys, page 69-83. ACM, (2022)GnuStream: a P2P media streaming system prototype., , , and . ICME, page 325-328. IEEE Computer Society, (2003)