Author of the publication

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.

, , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 122-142. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors., , and . DMS, page 257-260. Knowledge Systems Institute, (2010)Secure Semantic Sensor Web and Pervasive Computing., and . SUTC/UMC, page 5-10. IEEE Computer Society, (2010)Centralized Security Labels in Decentralized P2P Networks., , and . ACSAC, page 315-324. IEEE Computer Society, (2007)Vigiles: Fine-Grained Access Control for MapReduce Systems., , , and . BigData Congress, page 40-47. IEEE Computer Society, (2014)Data Mining for Security Applications., , , and . EUC (2), page 585-589. IEEE Computer Society, (2008)978-0-7695-3492-3.CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs., , and . DATE, page 474-479. IEEE, (2019)AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing., and . TrustCom, page 170-176. IEEE Computer Society, (2012)Exploiting an antivirus interface., , , , and . Computer Standards & Interfaces, 31 (6): 1182-1189 (2009)Automated Threat Report Classification over Multi-Source Data., , , , and . CIC, page 236-245. IEEE Computer Society, (2018)Binary Control-Flow Trimming., and . CCS, page 1009-1022. ACM, (2019)