Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Oberon System Family., , , and . Softw., Pract. Exper., 25 (12): 1331-1366 (1995)Emulating an Operating System on Top of Another.. Softw., Pract. Exper., 23 (6): 677-692 (1993)Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities., , , , , and . CISIS, page 843-848. (2008)Profile-guided automated software diversity., , , , and . CGO, page 23:1-23:11. IEEE Computer Society, (2013)Runtime Defense against Code Injection Attacks Using Replicated Execution., , , , and . IEEE Trans. Dependable Sec. Comput., 8 (4): 588-601 (2011)Containing the Ultimate Trojan Horse.. IEEE Security & Privacy, 5 (4): 52-56 (2007)Subversive-C: Abusing and Protecting Dynamic Message Dispatch., , , , , , , , and . USENIX Annual Technical Conference, page 209-221. USENIX Association, (2016)The rewards of generating true 32-bit code.. SIGPLAN Notices, 26 (1): 121-123 (1991)Information flow tracking meets just-in-time compilation., , , , and . TACO, 10 (4): 38:1-38:25 (2013)Perpetual Adaptation of Software to Hardware: An Extensible Architecture for Providing Code Optimization as a Central System Service, and . CoRR, (1999)