Author of the publication

Integrity walls: finding attack surfaces from mandatory access control policies.

, , , , and . AsiaCCS, page 75-76. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers., , and . POLICY, page 95-102. IEEE Computer Society, (2010)A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution., , and . EC2ND, page 1-8. IEEE Computer Society, (2011)Measuring integrity on mobile phone systems., , , , and . SACMAT, page 155-164. ACM, (2008)Outlook: Cloudy with a Chance of Security Challenges and Improvements., and . IEEE Security & Privacy, 8 (1): 77-80 (2010)Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware., , , , and . GLOBECOM, page 1-6. IEEE, (2010)The SMM Rootkit Revisited: Fun with USB., and . ARES, page 279-286. IEEE Computer Society, (2014)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)Clinical Workflows for Collecting Family Health History in Primary Care., , , , , , , , , and 3 other author(s). AMIA, AMIA, (2018)STING: Finding Name Resolution Vulnerabilities in Programs., , and . USENIX Security Symposium, page 585-599. USENIX Association, (2012)Establishing and Sustaining System Integrity via Root of Trust Installation., , , and . ACSAC, page 19-29. IEEE Computer Society, (2007)