Cited By
View all- Valdez EAhmed SGu Zde Dinechin CCheng PJamjoom HLuo BLiao XXu JKirda ELie D(2024)Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670352(1390-1404)Online publication date: 2-Dec-2024
- Inam MChen YGoyal ALiu JMink JMichael NGaur SBates AHassan W(2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
- Sun PChen SFan LGao PSong FYang M(2022)VenomAttack: automated and adaptive activity hijacking in AndroidFrontiers of Computer Science10.1007/s11704-021-1126-x17:1Online publication date: 8-Aug-2022
- Show More Cited By