1 – 6 of 6
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2017
-
Mark
Blockchain-based publishing layer for the Keyless Signing Infrastructure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Exploiting Trust in Deterministic Builds
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2011
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter