Author of the publication

Using instruction block signatures to counter code injection attacks.

, , and . SIGARCH Computer Architecture News, 33 (1): 108-117 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors., and . ERSA, page 212-218. CSREA Press, (2009)On Effectiveness of Compressed File Transfers to/from the Cloud: An Experimental Evaluation., and . PECCS, page 173-184. SciTePress, (2018)Using CQRS Pattern for Improving Performances in Medical Information Systems., , and . BCI (Local), volume 1036 of CEUR Workshop Proceedings, page 86. CEUR-WS.org, (2013)A model based analysis of optimality of sit-to-stand transition., , , and . EMBC, page 2398-2401. IEEE, (2017)A mobile system for assessment of physiological response to posture transitions., , and . EMBC, page 7205-7208. IEEE, (2013)Quantifying Benefits of Lossless Compression Utilities on Modern Smartphones., , and . ICCCN, page 1-9. IEEE, (2015)A Smartphone Application Suite for Assessing Mobility., , , and . EMBC, page 3117-3120. IEEE, (2016)Using instruction block signatures to counter code injection attacks., , and . SIGARCH Computer Architecture News, 33 (1): 108-117 (2005)Exploiting cache coherence for effective on-the-fly data tracing in multicores., and . ICCD, page 312-319. IEEE Computer Society, (2016)Execution characteristics of SPEC CPU2000 benchmarks: Intel C++ vs. Microsoft VC++., and . ACM Southeast Regional Conference, page 261-266. ACM, (2004)