Author of the publication

Trellis: Privilege Separation for Multi-user Applications Made Easy.

, , , , , , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 437-456. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GIVS: integrity validation for grid security., and . IJCIS, 4 (3): 319-333 (2008)Performance Issues in Video Streaming Environments., , , and . FIRB-Perf, page 3-14. IEEE Computer Society, (2005)BlueBat: Towards Practical Bluetooth Honeypots., , and . ICC, page 1-6. IEEE, (2009)Detecting Intrusions through System Call Sequence and Argument Analysis., , and . IEEE Trans. Dependable Sec. Comput., 7 (4): 381-395 (2010)XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners., , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 243-258. Springer, (2016)Unsupervised learning techniques for an intrusion detection system., and . SAC, page 412-419. ACM, (2004)Finding Non-trivial Malware Naming Inconsistencies., , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 144-159. Springer, (2011)HelDroid: Dissecting and Detecting Mobile Ransomware., , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 382-404. Springer, (2015)Analyzing TCP Traffic Patterns Using Self Organizing Maps.. ICIAP, volume 3617 of Lecture Notes in Computer Science, page 83-90. Springer, (2005)SysTaint: Assisting Reversing of Malicious Network Communications., , , , and . SSPREW@ACSAC, page 4:1-4:12. ACM, (2018)