Author of the publication

Practical Timing Side Channel Attacks against Kernel Space ASLR.

, , and . IEEE Symposium on Security and Privacy, page 191-205. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones., , , , , , , and . NDSS, The Internet Society, (2012)Laser Beam Melting for Tooling Applications - New Perspectives for Resource-Efficient Metal Forming and Die Casting Processes., , , and . NEW PROLAMAT, volume 411 of IFIP Advances in Information and Communication Technology, page 124-137. Springer, (2013)Practical Timing Side Channel Attacks against Kernel Space ASLR., , and . IEEE Symposium on Security and Privacy, page 191-205. IEEE Computer Society, (2013)Das Internet-Malware-Analyse-System (InMAS) - Ein System zur großflächigen Sammlung und Analyse von Schadsoftware im Internet., , , , , , , and . Datenschutz und Datensicherheit, 35 (4): 247-252 (2011)Down to the bare metal: using processor features for binary analysis., , , , , and . ACSAC, page 189-198. ACM, (2012)Poster: control-flow integrity for smartphones., , , , , , , and . ACM Conference on Computer and Communications Security, page 749-752. ACM, (2011)Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms., , and . USENIX Security Symposium, page 383-398. USENIX Association, (2009)PSiOS: bring your own privacy & security to iOS devices., , , , and . AsiaCCS, page 13-24. ACM, (2013)JACKSTRAWS: Picking Command and Control Connections from Bot Traffic., , , and . USENIX Security Symposium, USENIX Association, (2011)An experimental security analysis of two satphone standards., , , , and . ACM Trans. Inf. Syst. Secur., 16 (3): 10:1-10:30 (2013)