Author of the publication

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.

, , , , , , , , , and . ACM Conference on Computer and Communications Security, page 243-255. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adoption Challenges of Code Randomization., and . MTD@CCS, page 45-49. ACM, (2020)Taming Parallelism in a Multi-Variant Execution Environment., , , , , and . EuroSys, page 270-285. ACM, (2017)Safe and efficient hybrid memory management for Java., , , , and . ISMM, page 81-92. ACM, (2015)Migrating C to Rust for Memory Safety.. IEEE Secur. Priv., 22 (4): 22-29 (July 2024)DMON: A Distributed Heterogeneous N-Variant System., , , , , , and . CoRR, (2019)Computational mouse atlases and their application to automatic assessment of craniofacial dysmorphology caused by the Crouzon mutation fgfr2(c342y), , , , , , , , , and . J Anat, 211 (1): 37--52 (2007)A Statistical Model of Head Asymmetry in Infants with Deformational Plagiocephaly., , , , , , , , , and 2 other author(s). SCIA, volume 4522 of Lecture Notes in Computer Science, page 898-907. Springer, (2007)dMVX: Secure and Efficient Multi-Variant Execution in a Distributed Setting., , , , and . EuroSec@EuroSys, page 41-47. ACM, (2021)Automated quantification and analysis of mandibular asymmetry., , , , , , , , and . ISBI, page 416-419. IEEE, (2010)Automated quantification and analysis of facial asymmetry in children with arthritis in the temporomandibular joint., , , , , , , , , and 3 other author(s). ISBI, page 1193-1196. IEEE, (2011)