Search for persons
X
?
Proceedings of the 22nd Workshop on Privacy in the Electronic Society ,
2
From Privacy Policies to Privacy Threats: A Case Study in P..:
, In:
?
Proceedings of the 6th Workshop on System Software for Trusted Execution ,
5
About Time: On the Challenges of Temporal Guarantees in Unt..:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
6
Rewind & Discard: Improving Software Resilience using Isola..:
, In:
?
2023 IEEE Secure Development Conference (SecDev) ,
7
Friend or Foe Inside? Exploring In-Process Isolation to Mai..:
, In:
?
2023 IEEE 16th International Conference on Cloud Computing (CLOUD) ,
8
Zero-Cost In-Depth Enforcement of Network Policies for Low-..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
10
Aion: Enabling Open Systems through Strong Availability Gua..:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
11
Compiler-Assisted Hardening of Embedded Software Against In..:
, In:
?
2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit) ,
12
Network Policies in Kubernetes: Performance Evaluation and ..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
14
POSTER: An Open-Source Framework for Developing Heterogeneo..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
15