Author of the publication

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.

, , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 475-493. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 475-493. Springer, (2014)Secure Cryptography Infrastructures in the Cloud., , , , , , and . GLOBECOM, page 1-7. IEEE, (2019)A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 105-117. Springer, (2017)Towards Fine-Grained Access Control on Browser Extensions., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 158-169. Springer, (2012)FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs., , , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 675-693. Springer, (2016)A PUF and Software Collaborative Key Protection Scheme., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 291-303. Springer, (2017)Implementation of High Throughput XTS-SM4 Module for Data Storage Devices., , , , and . SecureComm (2), volume 255 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 271-290. Springer, (2018)A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs., , , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 475-493. Springer, (2019)Android Control Flow Obfuscation Based on Dynamic Entry Points Modification., , , , and . CSCS, page 296-303. IEEE, (2019)KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation., , , , and . ISCC, page 1-6. IEEE, (2019)