Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Sound Detection of Virtual Machines., , , , , and . Botnet Detection, volume 36 of Advances in Information Security, Springer, (2008)On Adversary Models and Compositional Security., , , , and . IEEE Security & Privacy, 9 (3): 26-32 (2011)Mapping Internet Sensors with Probe Response Attacks., , and . USENIX Security Symposium, USENIX Association, (2005)Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting., and . USENIX Security Symposium, USENIX Association, (2006)Parametric Verification of Address Space Separation., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 51-68. Springer, (2012)Compositional System Security with Interface-Confined Adversaries., , , and . Electr. Notes Theor. Comput. Sci., (2010)A Logic of Secure Systems and its Application to Trusted Computing., , , and . IEEE Symposium on Security and Privacy, page 221-236. IEEE Computer Society, (2009)Compatibility Is Not Transparency: VMM Detection Myths and Realities., , , and . HotOS, USENIX Association, (2007)Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size., , , and . IEEE Symposium on Security and Privacy, page 365-379. IEEE Computer Society, (2010)Energy-efficient cluster computing with FAWN: workloads and implications., , , , , and . e-Energy, page 195-204. ACM, (2010)