Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Automated Software Diversity., , , and . IEEE Symposium on Security and Privacy, page 276-291. IEEE Computer Society, (2014)Opaque Control-Flow Integrity., , , , and . NDSS, The Internet Society, (2015)Expressing Coarse-Grain Dependencies Among Tasks in Shared Memory Programs., , and . IEEE Trans. Industrial Informatics, 7 (4): 652-660 (2011)Similarity-based matching meets Malware Diversity., , , , , and . CoRR, (2014)An Efficient and Generic Event-based Profiler Framework for Dynamic Languages., , , , and . PPPJ, page 102-112. ACM, (2015)Taming Parallelism in a Multi-Variant Execution Environment., , , , , and . EuroSys, page 270-285. ACM, (2017)It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 243-255. ACM, (2015)Profile-guided automated software diversity., , , , and . CGO, page 23:1-23:11. IEEE Computer Society, (2013)Genus Zero Graph Segmentation: Estimation of Intracranial Volume., , , , , , , and . SCIA, volume 7944 of Lecture Notes in Computer Science, page 290-298. Springer, (2013)PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning., , , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 403-422. Springer, (2018)