Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks., , , , , , and . NOMS, page 121-128. IEEE, (2008)Leveraging Uncertainty for Effective Malware Mitigation., , , , , , , and . CoRR, (2018)Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security., , , , , , , , and . NSPW, page 23-35. ACM, (2016)It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots., , , , , and . ACSAC, page 296-305. ACM, (2014)Cooperation and security isolation of library OSes for multi-process applications., , , , , , , , , and . EuroSys, page 9:1-9:14. ACM, (2014)Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries., and . NSPW, page 141-152. ACM, (2012)An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities., , , , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 227-242. Springer, (2016)ExecRecorder: VM-based full-system replay for attack analysis and system recovery., , , , , and . ASID, page 66-71. ACM, (2006)Trustworthy opportunistic sensing: A Social Computing Paradigm., , , and . IRI, page 513-518. IEEE Systems, Man, and Cybernetics Society, (2011)Technical Foundations of Information Systems Security., and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)