Author of the publication

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.

, , , , , , , , and . USENIX Annual Technical Conference, page 209-221. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: Automated Software Diversity., , , and . IEEE Symposium on Security and Privacy, page 276-291. IEEE Computer Society, (2014)Opaque Control-Flow Integrity., , , , and . NDSS, The Internet Society, (2015)Expressing Coarse-Grain Dependencies Among Tasks in Shared Memory Programs., , and . IEEE Trans. Industrial Informatics, 7 (4): 652-660 (2011)Similarity-based matching meets Malware Diversity., , , , , and . CoRR, (2014)An Efficient and Generic Event-based Profiler Framework for Dynamic Languages., , , , and . PPPJ, page 102-112. ACM, (2015)Taming Parallelism in a Multi-Variant Execution Environment., , , , , and . EuroSys, page 270-285. ACM, (2017)It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 243-255. ACM, (2015)Profile-guided automated software diversity., , , , and . CGO, page 23:1-23:11. IEEE Computer Society, (2013)Subversive-C: Abusing and Protecting Dynamic Message Dispatch., , , , , , , , and . USENIX Annual Technical Conference, page 209-221. USENIX Association, (2016)Information flow tracking meets just-in-time compilation., , , , and . TACO, 10 (4): 38:1-38:25 (2013)