From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamically extending the Corral with native code for high-speed packet processing., , и . Comput. Networks, 50 (14): 2444-2461 (2006)CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks., , и . EuroS&P, стр. 514-529. IEEE, (2017)Practical Context-Sensitive CFI., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 927-940. ACM, (2015)MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1714-1730. ACM, (2018)METAlloc: efficient and comprehensive metadata management for software security hardening., , , и . EUROSEC, стр. 5:1-5:6. ACM, (2016)Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion., , , и . SOSP, стр. 531-545. ACM, (2017)Reliable Recon in Adversarial Peer-to-Peer Botnets., , и . Internet Measurement Conference, стр. 129-140. ACM, (2015)How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication., , и . Financial Cryptography, том 9603 из Lecture Notes in Computer Science, стр. 405-421. Springer, (2016)Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)., , , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2014)Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract)., и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 41-50. Springer, (2014)