Cited By
View all- Valdez EAhmed SGu Zde Dinechin CCheng PJamjoom HLuo BLiao XXu JKirda ELie D(2024)Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670352(1390-1404)Online publication date: 2-Dec-2024
- Bellizzi JVella MColombo CHernandez-Castro J(2022)Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory DumpsIEEE Access10.1109/ACCESS.2022.316053110(35172-35218)Online publication date: 2022
- Benkraouda HNahrstedt K(2021)Image reconstruction attacks on distributed machine learning modelsProceedings of the 2nd ACM International Workshop on Distributed Machine Learning10.1145/3488659.3493779(29-35)Online publication date: 7-Dec-2021
- Show More Cited By