Author of the publication

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.

, , , , and . USENIX Security Symposium, page 1137-1151. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Architectural Approach to Preventing Code Injection Attacks., , and . IEEE Trans. Dependable Sec. Comput., 7 (4): 351-365 (2010)Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images., , , , and . USENIX Security Symposium, page 1137-1151. USENIX Association, (2016)DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse., , , and . USENIX Security Symposium, page 255-269. USENIX Association, (2014)An Architectural Approach to Preventing Code Injection Attacks., , and . DSN, page 30-40. IEEE Computer Society, (2007)VNsnap: Taking Snapshots of Virtual Networked Infrastructures in the Cloud., , and . IEEE Trans. Services Computing, 5 (4): 484-496 (2012)LDX: Causality Inference by Lightweight Dual Execution., , , , , , and . ASPLOS, page 503-515. ACM, (2016)Multi-aspect profiling of kernel rootkit behavior., , and . EuroSys, page 47-60. ACM, (2009)IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces., , , , , , and . SIGMETRICS, page 235-247. ACM, (2014)DRIP: A framework for purifying trojaned kernel drivers., , , , and . DSN, page 1-12. IEEE Computer Society, (2013)VNsnap: Taking snapshots of virtual networked environments with minimal downtime., , and . DSN, page 524-533. IEEE Computer Society, (2009)