Author of the publication

Zero-Sum Defender: Fast and Space-Efficient Defense against Return-Oriented Programming Attacks.

, , , and . IEICE Transactions, 97-A (1): 303-305 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 134-141. Springer, (2010)Agent-based Intelligent Middleware for User-Centric Services in Ubiquitous Computing Environments., , , and . J. Inf. Sci. Eng., 27 (5): 1729-1746 (2011)General Context-Aware Role-Based Access Control System., , , and . Security and Management, page 75-80. CSREA Press, (2010)Fast and space-efficient defense against jump-oriented programming attacks., and . BigComp, page 7-10. IEEE Computer Society, (2015)User Adaptive Recommendation Model by Using User Clustering based on Decision Tree., , , and . CIT, page 1346-1351. IEEE Computer Society, (2010)Cross-Layer Service Discovery Using Multi-Path for Wireless Environments., and . ACIS-ICIS, page 786-790. IEEE Computer Society, (2009)A Lightweight Pseudo CPU Hotplug Mechanism for Mobile Devices., , , , and . NGMAST, page 53-58. IEEE, (2016)URS: User-Based Resource Scheduling for Multi-User Surface Computing Systems., and . IEEE Trans. Consumer Electronics, 65 (3): 426-433 (2019)Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments., , , and . IPCCC, page 491-498. IEEE Computer Society, (2008)Implementation of OSD Security Framework and Credential Cache., , , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 666-671. Springer, (2007)