Author of the publication

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.

, , , , , and . CODASPY, page 161-163. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iCore: continuous and proactive extrospection on multi-core IoT devices., , , , and . SAC, page 851-860. ACM, (2019)HoneyMix: Toward SDN-based Intelligent Honeynet., , , and . SDN-NFV@CODASPY, page 1-6. ACM, (2016)CacheLight: Defeating the CacheKit Attack., , , , and . ASHES@CCS, page 65-74. ACM, (2018)Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone., , , , , , , and . ACSAC, page 441-452. ACM, (2018)Challenges in cybersecurity: Lessons from biological defense systems., , , , , , , , , and 12 other author(s). CoRR, (2021)Toward Standardization of Authenticated Caller ID Transmission., , , and . IEEE Communications Standards Magazine, 1 (3): 30-36 (2017)SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms., , , , , and . CODASPY, page 161-163. ACM, (2018)Everyone is Different: Client-side Diversification for Defending Against Extension Fingerprinting., , , , and . USENIX Security Symposium, page 1679-1696. USENIX Association, (2019)Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners., , and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 111-131. Springer, (2010)A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications., , , , , , and . AAMAS, page 178-186. ACM, (2017)