Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Vijayakumar, Hayawardh
add a person with the name Vijayakumar, Hayawardh
 

Other publications of authors with the same name

Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture., , and . CoRR, (2014)InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android., , , , , , and . NDSS, The Internet Society, (2018)Cloud Verifier: Verifiable Auditing Service for IaaS Clouds., , , and . SERVICES, page 239-246. IEEE Computer Society, (2013)Transforming commodity security policies to enforce Clark-Wilson integrity., , , , , and . ACSAC, page 269-278. ACM, (2012)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)STING: Finding Name Resolution Vulnerabilities in Programs., , and . USENIX Security Symposium, page 585-599. USENIX Association, (2012)Policy models to protect resource retrieval., , and . SACMAT, page 211-222. ACM, (2014)Verifying System Integrity by Proxy., , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 179-200. Springer, (2012)Process firewalls: protecting processes during resource access., , and . EuroSys, page 57-70. ACM, (2013)Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services., , , , and . CLOUD, page 253-260. IEEE, (2015)