Author of the publication

POSTER: A Measurement Framework to Quantify Software Protections.

, , , and . ACM Conference on Computer and Communications Security, page 1505-1507. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge., , , , , , and . Empirical Software Engineering, 24 (1): 240-286 (2019)Feedback-driven binary code diversification., , and . TACO, 9 (4): 24:1-24:26 (2013)Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks., , , , , and . SPRO@CCS, page 73-84. ACM, (2016)How professional hackers understand protected code while performing attack tasks., , , , , , and . ICPC, page 154-164. IEEE Computer Society, (2017)A Novel Obfuscation: Class Hierarchy Flattening., , , and . FPS, volume 7743 of Lecture Notes in Computer Science, page 194-210. Springer, (2012)Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors., , , and . IEEE Symposium on Security and Privacy, page 45-60. IEEE Computer Society, (2009)Taming Parallelism in a Multi-Variant Execution Environment., , , , , and . EuroSys, page 270-285. ACM, (2017)Compiler mitigations for time attacks on modern x86 processors., , and . TACO, 8 (4): 23:1-23:20 (2012)Software Protection with Code Mobility., , , , and . MTD@CCS, page 95-103. ACM, (2015)SOFIA: Software and control flow integrity architecture., , , , , , , , and . DATE, page 1172-1177. IEEE, (2016)