Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Look at Targeted Attacks Through the Lense of an NGO., , , , , and . USENIX Security Symposium, page 543-558. USENIX Association, (2014)Fuzzing Program Logic Deeply Hidden in Binary Program Stages., , , , and . SANER, page 105-116. IEEE, (2019)Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software., , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 312-331. Springer, (2015)Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 217-230. Springer, (2013)Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks., , , and . CoRR, (2015)One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics., , , , , and . NDSS, The Internet Society, (2019)Automatic Generation of Data-Oriented Exploits., , , , and . USENIX Security Symposium, page 177-192. USENIX Association, (2015)Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework., , , , , and . CoRR, (2019)Preventing Page Faults from Telling Your Secrets., , , and . AsiaCCS, page 317-328. ACM, (2016)"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing., , , , , and . ACM Conference on Computer and Communications Security, page 791-804. ACM, (2016)