Dominance as a New Trusted Computing Primitive for the Internet of Things |
40th IEEE Symposium on Security and Privacy
|
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking |
ACM CCS 2017
|
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX |
Black Hat USA 2016
|
Rosemary: A Robust, Secure, and High-performance Network Operating System |
ACM CCS 2014
|
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities |
35th IEEE Symposium on Security and Privacy
|