Author of the publication

Parametric Verification of Address Space Separation.

, , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture., , , , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 141-165. Springer, (2010)Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)KalKi: A Software-Defined IoT Security Platform., , , , , , , , and . WF-IoT, page 1-6. IEEE, (2020)Re-inforced stealth breakpoints.. CRiSIS, page 59-66. IEEE, (2009)Cobra: Fine-grained Malware Analysis using Stealth Localized-executions., and . S&P, page 264-279. IEEE Computer Society, (2006)XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms., , and . HICSS, page 1-10. IEEE Computer Society, (2011)SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation., and . ACSC, volume 48 of CRPIT, page 311-320. Australian Computer Society, (2006)Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, , , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 159-178. Springer, (2012)Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework. Springer Briefs in Computer Science Springer, (2019)Mixed-Trust Computing for Real-Time Systems., , , , , , and . RTCSA, page 1-11. IEEE, (2019)