Author of the publication

Poster: control-flow integrity for smartphones.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 749-752. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions., , , , and . Towards Hardware-Intrinsic Security, Springer, (2010)Mobile Platform Security, , , , , , and . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2013)Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization., , , , , and . IEEE Symposium on Security and Privacy, page 574-588. IEEE Computer Society, (2013)A Security Architecture for Accessing Health Records on Mobile Phones., , , , and . HEALTHINF, page 87-96. SciTePress, (2011)Private Auctions with Multiple Rounds and Multiple Items., , and . DEXA Workshops, page 423-427. IEEE Computer Society, (2002)CryptoML: Secure outsourcing of big data machine learning applications., , and . HOST, page 149-154. IEEE Computer Society, (2016)Readactor: Practical Code Randomization Resilient to Memory Disclosure., , , , , , , and . IEEE Symposium on Security and Privacy, page 763-780. IEEE Computer Society, (2015)Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure., , and . EUSIPCO, page 1-4. IEEE, (2002)The Cybersecurity Landscape in Industrial Control Systems., , , , , , and . Proceedings of the IEEE, 104 (5): 1039-1057 (2016)Security & Privacy Week Interviews, Part 1., and . IEEE Security & Privacy, 14 (5): 58-67 (2016)