Author of the publication

CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.

, , , , and . USENIX Security Symposium, page 1805-1821. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Direct illumination for many area lights., , and . VRCAI, page 257-264. ACM, (2010)An improved weakly compressible SPH method for simulating free surface flows of viscous and viscoelastic fluids., and . Comput. Phys. Commun., (2016)Interactive provenance summaries for reproducible science., , and . eScience, page 355-360. IEEE Computer Society, (2016)Semantic Annotation of Web Objects Using Constrained Conditional Random Fields., , , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 28-39. Springer, (2010)Automated anatomical labeling of coronary arteries via bidirectional tree LSTMs., , , , , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 14 (2): 271-280 (2019)SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks., , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 122-142. Springer, (2018)A mixed corrected symmetric SPH (MC-SSPH) method for computational dynamic problems., , , , and . Comput. Phys. Commun., 183 (1): 50-62 (2012)CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software., , , , and . USENIX Security Symposium, page 1805-1821. USENIX Association, (2019)Object Flow Integrity., , and . ACM Conference on Computer and Communications Security, page 1909-1924. ACM, (2017)Research on Shadow Map Based Shadow Generation., , , and . Edutainment, volume 6249 of Lecture Notes in Computer Science, page 529-540. Springer, (2010)