From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Challenges and Solutions for Industry-Grade Secure Connectivity., , , , и . NetSys, стр. 1-5. IEEE, (2019)Security analysis of hardware-OS interfaces in Linux.. Technical University of Berlin, Germany, (2022)PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary., , , , , , , , , и . NDSS, The Internet Society, (2019)What You Trace is What You Get: Dynamic Stack-Layout Recovery for Binary Recompilation., , , и . ASPLOS (2), стр. 1250-1263. ACM, (2024)Security Analysis of Encrypted Virtual Machines., и . VEE, стр. 129-142. ACM, (2017)VIA: Analyzing Device Interfaces of Protected Virtual Machines., , , , и . ACSAC, стр. 273-284. ACM, (2021)Secure Real-time Communication and Computing Infrastructure for Industry 4.0 - Challenges and Opportunities., , , , , , , , , и 2 other автор(ы). NetSys, стр. 1-6. IEEE, (2019)Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints., , , , , и . USENIX Security Symposium, стр. 2541-2557. USENIX Association, (2020)DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases., , и . CoRR, (2022)Polynima: Practical Hybrid Recompilation for Multithreaded Binaries., , , и . EuroSys, стр. 1126-1141. ACM, (2024)