Author of the publication

Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection.

, , , and . Computers & Security, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dumitras, Tudor
add a person with the name Dumitras, Tudor
 

Other publications of authors with the same name

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching., , , , and . IEEE Symposium on Security and Privacy, page 692-708. IEEE Computer Society, (2015)Fault-Tolerant Middleware and the Magical 1%., and . Middleware, volume 3790 of Lecture Notes in Computer Science, page 431-441. Springer, (2005)Shallow-Deep Networks: Understanding and Mitigating Network Overthinking., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3301-3310. PMLR, (2019)The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics., , , , and . ACM Conference on Computer and Communications Security, page 1118-1129. ACM, (2015)Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns., , , and . NDSS, The Internet Society, (2017)Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection., , , and . Computers & Security, (2018)Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State., , , , and . PAM, volume 10176 of Lecture Notes in Computer Science, page 113-125. Springer, (2017)SharkFin: Spatio-temporal mining of software adoption and penetration., , , , and . Social Netw. Analys. Mining, 4 (1): 240 (2014)Toward Semantic Cryptography APIs., , , and . SecDev, page 9-14. IEEE Computer Society, (2016)Ecotopia: An Ecological Framework for Change Management in Distributed Systems., , , and . WADS, volume 4615 of Lecture Notes in Computer Science, page 262-286. Springer, (2006)