Author of the publication

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity.

, , , , , , and . ACM Conference on Computer and Communications Security, page 901-913. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental Results for and Theoretical Analysis of a Self-Organizing Global Coordinate System for Ad Hoc Sensor Networks., , , and . Telecommunication Systems, 26 (2-4): 213-233 (2004)AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)The Innovative Applications of Artificial Intelligence Conference: Past and Future.. AI Magazine, 17 (4): 15-20 (1996)Supporting and Optimizing Full Unification in a Forward Chaining Rule System.. AAAI, page 710-715. AAAI Press / The MIT Press, (1993)Two Challenging Domains.. ACM Comput. Surv., 28 (4es): 12 (1996)Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network., , and . IPSN, volume 2634 of Lecture Notes in Computer Science, page 333-348. Springer, (2003)A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)Active Trust Management for Autonomous Adaptive Survivable Systems., and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 40-49. Springer, (2000)Introduction: The First International Workshop on Self-Adaptive Software., , and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 1-10. Springer, (2000)