Author of the publication

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.

, , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 122-142. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object Flow Integrity., , and . ACM Conference on Computer and Communications Security, page 1909-1924. ACM, (2017)CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software., , , , and . USENIX Security Symposium, page 1805-1821. USENIX Association, (2019)Notes on Rainbow Distinguished Point Method.. CoRR, (2015)Modeling the Seismic Impacts on Communication Networks in Smart Grid., , and . IJDSN, (2015)Attentive WaveBlock: Complementarity-Enhanced Mutual Networks for Unsupervised Domain Adaptation in Person Re-Identification and Beyond., , , and . IEEE Trans. Image Process., (2022)Visual Perception Model for Sense of Materials., and . HCI (23), volume 174 of Communications in Computer and Information Science, page 365-368. Springer, (2011)Wireless Physical-Layer Identification: Modeling and Validation., , , , and . IEEE Trans. Information Forensics and Security, 11 (9): 2091-2106 (2016)Binary Code Retrofitting and Hardening Using SGX., , , , , and . FEAST@CCS, page 43-49. ACM, (2017)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , and . ACM Conference on Computer and Communications Security, page 2421-2434. ACM, (2017)An Improved 3D Location Algorithm Model Research Based on Directional TD-MUSIC., , , , , , , and . SmartCity, page 581-585. IEEE Computer Society, (2015)