Personensuche
X
?
Proceedings of the 7th Symposium on Hot Topics in the Science of Security ,
1
Ghostbusting : mitigating spectre with intraprocess memo..:
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
2
Human-Computability Boundaries:
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
3
Mismorphism: The Heart of the Weird Machine:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII ,
4
Converting an Electric Power Utility Network to Defend Agai..:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII ,
5
Dynamic Repair of Mission-Critical Applications with Runtim..:
, In:
?
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security ,
7
Reinventing the privilege drop : how principled preserva..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
8
Protecting Against Malicious Bits On the Wire : Automati..:
, In:
?
Proceedings of the 2nd Annual Industrial Control System Security Workshop ,
9
Implementing a vertically hardened DNP3 control stack for p..:
, In:
?
Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks ,
11
Short paper : speaking the local dialect: exploiting dif..:
, In:
?
Proceedings of the 30th Annual Computer Security Applications Conference ,
12