Author of the publication

Parametric Verification of Address Space Separation.

, , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An inquiry into the nature and causes of the wealth of internet miscreants., , , and . ACM Conference on Computer and Communications Security, page 375-388. ACM, (2007)A Logic of Secure Systems and its Application to Trusted Computing., , , and . SP, page 221-236. IEEE Computer Society, (2009)Compositional System Security with Interface-Confined Adversaries., , , and . MFPS, volume 265 of Electronic Notes in Theoretical Computer Science, page 49-71. Elsevier, (2010)Replayer: automatic protocol replay by binary analysis., , , and . CCS, page 311-321. ACM, (2006)Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size., , , and . IEEE Symposium on Security and Privacy, page 365-379. IEEE Computer Society, (2010)Compatibility Is Not Transparency: VMM Detection Myths and Realities., , , and . HotOS, USENIX Association, (2007)Towards Sound Detection of Virtual Machines., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)On Adversary Models and Compositional Security., , , , and . IEEE Secur. Priv., 9 (3): 26-32 (2011)Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting., and . USENIX Security Symposium, USENIX Association, (2006)