Author of the publication

Ninja: Towards Transparent Tracing and Debugging on ARM.

, and . USENIX Security Symposium, page 33-49. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking BLE Beacons For Fun But Mostly Profit., , , and . EUROSEC, page 4:1-4:6. ACM, (2017)Efficient and DoS-resistant Consensus for Permissioned Blockchains., , , , , , , , , and 3 other author(s). Perform. Evaluation, (2022)Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery., , , , , , and . CCS, page 341-355. ACM, (2023)Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research., , , , , and . HASP@MICRO, page 5:1-5:8. ACM, (2021)Speedster: An Efficient Multi-party State Channel via Enclaves., , , and . AsiaCCS, page 637-651. ACM, (2022)Smile: Secure Memory Introspection for Live Enclave., , and . SP, page 386-401. IEEE, (2022)Nighthawk: Transparent System Introspection from Ring -3., , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 217-238. Springer, (2019)Temporal metrics for software vulnerabilities., , and . CSIIRW, page 44:1-44:3. ACM, (2008)BADUSB-C: Revisiting BadUSB with Type-C., , , , , and . SP (Workshops), page 327-338. IEEE, (2021)Class-Chord: Efficient Messages to Classes of Nodes in Chord., , , , and . CSCloud, page 165-174. IEEE Computer Society, (2015)