Author of the publication

InfoShield: a security architecture for protecting information usage in memory.

, , , , , and . HPCA, page 222-231. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EFFORT: Efficient and effective bot malware detection., , and . INFOCOM, page 2846-2850. IEEE, (2012)CATS: Characterizing automation of Twitter spammers., , , , and . COMSNETS, page 1-10. IEEE, (2013)NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System., and . NDSS, The Internet Society, (2013)Model checking invariant security properties in OpenFlow., , , , and . ICC, page 1974-1979. IEEE, (2013)Shadow attacks: automatically evading system-call-behavior based malware detection., , , , and . Journal in Computer Virology, 8 (1-2): 1-13 (2012)AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization., , , and . ICDCS, page 112-123. IEEE Computer Society, (2013)UIPicker: User-Input Privacy Identification in Mobile Applications., , , , , and . USENIX Security Symposium, page 993-1008. USENIX Association, (2015)Rethinking Permission Enforcement Mechanism on Mobile Systems., , , and . IEEE Trans. Information Forensics and Security, 11 (10): 2227-2240 (2016)Identifying User-Input Privacy in Mobile Applications at a Large Scale., , , , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 647-661 (2017)A taste of tweets: reverse engineering Twitter spammers., , and . ACSAC, page 86-95. ACM, (2014)