Samuel Laurén

According to our database1, Samuel Laurén authored at least 15 papers between 2014 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Internal Interface Diversification as a Security Measure in Sensor Networks.
J. Sens. Actuator Networks, 2018

Diversification and obfuscation techniques for software security: A systematic literature review.
Inf. Softw. Technol., 2018

Virtual Machine Introspection based Cloud Monitoring Platform.
Proceedings of the 19th International Conference on Computer Systems and Technologies, 2018

2017
A Survey on Anti-honeypot and Anti-introspection Methods.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

A Survey on Application Sandboxing Techniques.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

Analysis of Security in Modern Container Platforms.
Proceedings of the Research Advances in Cloud Computing, 2017

2016
Security in container-based virtualization through vTPM.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Software Security Considerations for IoT.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

An interface diversified honeypot for malware analysis.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Diversification of system calls in linux kernel.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

2014
Symbol diversification of linux binaries.
Proceedings of the 2014 World Congress on Internet Security, 2014

Diversification of System Calls in Linux Binaries.
Proceedings of the Trusted Systems - 6th International Conference, 2014


  Loading...