Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cloudopsy: An Autopsy of Data Flows in the Cloud., , , , , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 366-375. Springer, (2013)CloudFence: Data Flow Tracking as a Cloud Service., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 411-431. Springer, (2013)Towards a Universal Data Provenance Framework Using Dynamic Instrumentation., , , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 103-114. Springer, (2012)Transparent ROP Exploit Mitigation Using Indirect Branch Tracing., , and . USENIX Security Symposium, page 447-462. USENIX Association, (2013)xJS: Practical XSS Prevention for Web Application Development., , , , , and . WebApps, USENIX Association, (2010)Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization., , and . IEEE Symposium on Security and Privacy, page 601-615. IEEE Computer Society, (2012)CellFlood: Attacking Tor Onion Routers on the Cheap., , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 664-681. Springer, (2013)Practical Software Diversification Using In-Place Code Randomization., , and . Moving Target Defense, volume 100 of Advances in Information Security, Springer, (2013)Compromising Anonymity Using Packet Spinning., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 161-174. Springer, (2008)Dynamic Reconstruction of Relocation Information for Stripped Binaries., , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 68-87. Springer, (2014)