Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MetaSync: File Synchronization Across Multiple Untrusted Storage Services., , , , , and . USENIX Annual Technical Conference, page 83-95. USENIX Association, (2015)Lightweight Application-Level Crash Consistency on Transactional Flash Storage., , , , and . USENIX Annual Technical Conference, page 221-234. USENIX Association, (2015)From Zygote to Morula: Fortifying Weakened ASLR on Android., , , , and . IEEE Symposium on Security and Privacy, page 424-439. IEEE Computer Society, (2014)Making Linux Protection Mechanisms Egalitarian with UserFS., and . USENIX Security Symposium, page 13-28. USENIX Association, (2010)Efficient Patch-based Auditing for Web Application Vulnerabilities., , and . OSDI, page 193-206. USENIX Association, (2012)Understanding Manycore Scalability of File Systems., , , and . USENIX Annual Technical Conference, page 71-85. USENIX Association, (2016)Preventing Use-after-free with Dangling Pointers Nullification., , , , , , and . NDSS, The Internet Society, (2015)OpenSGX: An Open Platform for SGX Research., , , , , , , , , and . NDSS, The Internet Society, (2016)Efficient Transmission of Reversible Data Hiding in Encryption Images by Using Reed-Solomon Codes., and . FiCloud, page 765-769. IEEE Computer Society, (2015)STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud., , and . USENIX Security Symposium, page 189-204. USENIX Association, (2012)