Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bauman, Erick
add a person with the name Bauman, Erick
 

Other publications of authors with the same name

Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults., , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 357-380. Springer, (2017)You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps., , , , , and . USENIX Security Symposium, page 657-690. USENIX Association, (2015)SGXElide: enabling enclave code secrecy via self-modification., , , and . CGO, page 75-86. ACM, (2018)A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions., , and . ACM Comput. Surv., 48 (1): 10:1-10:33 (2015)A Case for Protecting Computer Games With SGX., and . SysTEX@Middleware, page 4:1-4:6. ACM, (2016)SGX-Log: Securing System Logs With SGX., , , and . AsiaCCS, page 19-30. ACM, (2017)Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics., , and . NDSS, The Internet Society, (2018)Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach., , , , , and . AsiaCCS, page 114-121. ACM, (2019)Smart Contract Defense through Bytecode Rewriting., , , and . Blockchain, page 384-389. IEEE, (2019)Half a Century of Practice: Who Is Still Storing Plaintext Passwords?, , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 253-267. Springer, (2015)