Author of the publication

DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.

, , , and . USENIX Security Symposium, page 255-269. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Intellectual Property of Deep Neural Networks with Watermarking., , , , , , and . AsiaCCS, page 159-172. ACM, (2018)Process Implanting: A New Active Introspection Framework for Virtualization., , , and . SRDS, page 147-156. IEEE Computer Society, (2011)Reaching Data Confidentiality and Model Accountability on the CalTrain., , , , , , , and . CoRR, (2018)LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis., , , , , and . DSN, page 57-68. IEEE Computer Society, (2015)A Study on the Security Implications of Information Leakages in Container Clouds., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 174-191 (2021)FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine., , , and . DSN, page 491-502. IEEE Computer Society, (2014)Reaching Data Confidentiality and Model Accountability on the CalTrain., , , , , , , and . DSN, page 336-348. IEEE, (2019)Securing Real-Time Microcontroller Systems through Customized Memory View Switching., , , , , , and . NDSS, The Internet Society, (2018)VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images., , , , and . ACM Conference on Computer and Communications Security, page 146-157. ACM, (2015)Houdini's Escape: Breaking the Resource Rein of Linux Control Groups., , , , and . CCS, page 1073-1086. ACM, (2019)