SGXL: Security and Performance for Enclaves Using Large Pages | 1 | 0.39 | 2021 |
(Mis)managed: A Novel TLB-based Covert Channel on GPUs | 1 | 0.35 | 2021 |
Faastlane: Accelerating Function-As-A-Service Workflows | 0 | 0.34 | 2021 |
Privaros: A Framework for Privacy-Compliant Delivery Drones | 1 | 0.34 | 2020 |
Activethief: Model Extraction Using Active Learning And Unannotated Public Data | 0 | 0.34 | 2020 |
An evaluation of methods to port legacy code to SGX enclaves | 0 | 0.34 | 2020 |
A framework for the extraction of Deep Neural Networks by leveraging public data. | 3 | 0.37 | 2019 |
Regulating Drones in Restricted Spaces | 1 | 0.36 | 2019 |
Secure, Consistent, and High-Performance Memory Snapshotting. | 0 | 0.34 | 2018 |
Engarde: Mutually-Trusted Inspection Of Sgx Enclaves | 3 | 0.37 | 2017 |
Compiler Optimizations with Retrofitting Transformations: Is there a Semantic Mismatch? | 0 | 0.34 | 2017 |
Regulating ARM TrustZone Devices in Restricted Spaces. | 14 | 0.66 | 2016 |
Detecting plagiarized mobile apps using API birthmarks | 3 | 0.38 | 2016 |
Exploring infrastructure support for app-based services on cloud platforms. | 0 | 0.34 | 2016 |
Reflections on the Self-service Cloud Computing Project. | 0 | 0.34 | 2015 |
Testing Cross-Platform Mobile App Development Frameworks (T) | 6 | 0.42 | 2015 |
A novel algorithm for pattern matching with back references. | 0 | 0.34 | 2015 |
Efficient runtime-enforcement techniques for policy weaving | 3 | 0.39 | 2014 |
On the Control Plane of a Self-service Cloud Platform | 5 | 0.43 | 2014 |
Retargetting Legacy Browser Extensions to Modern Extension Frameworks. | 1 | 0.36 | 2014 |
Inferring likely mappings between APIs | 20 | 0.78 | 2013 |
Leveraging "choice" to automate authorization hook placement | 11 | 0.76 | 2012 |
Short paper: enhancing users' comprehension of android permissions | 7 | 0.52 | 2012 |
An analysis of the mozilla jetpack extension framework | 24 | 0.95 | 2012 |
Self-service cloud computing | 32 | 1.00 | 2012 |
Enhancing javascript with transactions | 4 | 0.40 | 2012 |
Fast submatch extraction using OBDDs | 4 | 0.64 | 2012 |
Towards a richer model of cloud app markets | 5 | 0.53 | 2012 |
Fast, memory-efficient regular expression matching with NFA-OBDDs | 5 | 0.42 | 2011 |
Security versus energy tradeoffs in host-based mobile malware detection | 12 | 0.66 | 2011 |
Monitoring data structures using hardware transactional memory | 2 | 0.36 | 2011 |
Detecting Kernel-Level Rootkits Using Data Structure Invariants | 36 | 1.24 | 2011 |
Enhancing Mobile Malware Detection with Social Collaboration. | 7 | 0.62 | 2011 |
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. | 12 | 0.61 | 2011 |
Rootkits on smart phones: attacks, implications and opportunities | 44 | 2.92 | 2010 |
Improving NFA-based signature matching using ordered binary decision diagrams | 10 | 0.63 | 2010 |
Core-Local Memory Assisted Protection | 4 | 0.50 | 2010 |
The case for JavaScript transactions: position paper | 3 | 0.43 | 2010 |
Privacy-aware identity management for client-side mashup applications | 5 | 0.46 | 2009 |
Working set-based access control for network file systems | 0 | 0.34 | 2009 |
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers | 10 | 0.54 | 2009 |
Analyzing Information Flow in JavaScript-Based Browser Extensions | 74 | 3.12 | 2009 |
Privately querying location-based services with SybilQuery | 52 | 1.87 | 2009 |
Automatic Inference and Enforcement of Kernel Data Structure Invariants | 82 | 3.57 | 2008 |
OMOS: A Framework for Secure Communication in Mashup Applications | 11 | 0.63 | 2008 |
Enforcing authorization policies using transactional memory introspection | 20 | 0.86 | 2008 |
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis | 21 | 1.00 | 2007 |
Microdrivers: a new architecture for device drivers | 14 | 0.83 | 2007 |
Retrofitting legacy code for authorization policy enforcement | 25 | 1.00 | 2006 |
NetSpy: Automatic Generation of Spyware Signatures for NIDS | 13 | 1.27 | 2006 |