Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Thwarting Advanced Code-reuse Attacks.. University of Michigan, USA, (2019)Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses., , , , , , , , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 42:1-42:38 (2021)Wrangling in the Power of Code Pointers with ProxyCFI., , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 317-337. Springer, (2019)Smokestack: Thwarting DOP Attacks with Runtime Stack Layout Randomization., and . CGO, page 26-36. IEEE, (2019)Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware., , , , , , , , , and . HOST, page 226-238. IEEE, (2021)High performance automatic target recognition., and . AFRICON, page 1-5. IEEE, (2015)Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware., , , , , , , , and . HCS, page 1-18. IEEE, (2021)Nethammer: Inducing Rowhammer Faults through Network Requests., , , , , , and . EuroS&P Workshops, page 710-719. IEEE, (2020)Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn., , , , , , , , , and 3 other author(s). ASPLOS, page 469-484. ACM, (2019)When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks., , and . HOST, page 8-13. IEEE Computer Society, (2017)