基本信息
views: 534

Bio
Fields of Research:
His research focus includes aspects of system security and trusted computing, particularly software exploitation techniques and defenses.
Honours and Awards:
Distinguished Paper Award Finalist at IEEE European Symposium on Security and Privacy (Euro S&P) 2022
3rd Place German IT-Security Prize 2020
Finalist Cyber Security Awareness Week (CSAW) Europe 2020
Distinguished Technical Poster Award at NDSS 2019
Finalist Cyber Security Awareness Week (CSAW) Europe 2018
Finalist Cyber Security Awareness Week (CSAW) Europe 2017
ACM SIGSAC Doctoral Dissertation Award 2016
Finalist Dissertation Prize IT-Security 2015/2016
Best Paper DAC 2015
Best Paper Award ACM ASIACCS 2015
Best Student Paper at IEEE Security & Privacy 2013
Distinguished Paper Award ACM ASIACCS 2013
Our research led to improvements of Microsoft EMET Version 5.1, s. EMET Blog
2nd Place German IT-Security Prize 2010
1st Place CAST Prize for IT-Security 2010
His research focus includes aspects of system security and trusted computing, particularly software exploitation techniques and defenses.
Honours and Awards:
Distinguished Paper Award Finalist at IEEE European Symposium on Security and Privacy (Euro S&P) 2022
3rd Place German IT-Security Prize 2020
Finalist Cyber Security Awareness Week (CSAW) Europe 2020
Distinguished Technical Poster Award at NDSS 2019
Finalist Cyber Security Awareness Week (CSAW) Europe 2018
Finalist Cyber Security Awareness Week (CSAW) Europe 2017
ACM SIGSAC Doctoral Dissertation Award 2016
Finalist Dissertation Prize IT-Security 2015/2016
Best Paper DAC 2015
Best Paper Award ACM ASIACCS 2015
Best Student Paper at IEEE Security & Privacy 2013
Distinguished Paper Award ACM ASIACCS 2013
Our research led to improvements of Microsoft EMET Version 5.1, s. EMET Blog
2nd Place German IT-Security Prize 2010
1st Place CAST Prize for IT-Security 2010
Research Interests
Papers共 115 篇Author StatisticsCo-AuthorSimilar Experts
By YearBy Citation主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
Annual ACM Conference on Computer and Communications Securitypp.4226-4240, (2024)
Behaviour and Information Technologypp.1-21, (2024)
PROCEEDINGS OF THE THIRTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2023pp.225-236, (2023)
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUMpp.1991-2008, (2023)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023 (2023): 32-61
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&Ppp.449-471, (2023)
Load More
Author Statistics
#Papers: 115
#Citation: 8218
H-Index: 35
G-Index: 80
Sociability: 5
Diversity: 2
Activity: 8
Co-Author
Co-Institution
D-Core
- 合作者
- 学生
- 导师
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn