Christopher Jämthagen (Former)
1 – 8 of 8
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2017
-
Mark
Blockchain-based publishing layer for the Keyless Signing Infrastructure
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Exploiting Trust in Deterministic Builds
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Offensive and Defensive Methods in Software Security
(2016)
- Thesis › Doctoral thesis (compilation)
- 2014
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
(2014)
- Book/Report › Report
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2013
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure RPC in embedded system - Evaluation of some GlobalPlatform implementation alternatives
(2013) WESS
- Contribution to conference › Paper, not in proceeding
- 2011
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
(2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137
- Chapter in Book/Report/Conference proceeding › Book chapter
