Lap-Chung Lam

According to our database1, Lap-Chung Lam authored at least 15 papers between 2000 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Applications of a feather-weight virtual machine.
Proceedings of the 4th International Conference on Virtual Execution Environments, 2008

Web Application Attack Prevention for Tiered Internet Services.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Dynamic multi-process information flow tracking for web application security.
Proceedings of the Middleware 2007, 2007

Accurate Application-Specific Sandboxing for Win32/Intel Binaries.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A feather-weight virtual machine for windows applications.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

Secure Mobile Code Execution Service.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Accurate and Automated System Call Policy-Based Intrusion Prevention.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

BIRD: Binary Interpretation using Runtime Disassembly.
Proceedings of the Fourth IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2006), 2006

Foreign Code Detection on the Windows/X86 Platform.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

How to Automatically and Accurately Sandbox Microsoft IIS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

A General Dynamic Information Flow Tracking Framework for Security Applications.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Checking Array Bound Violation Using Segmentation Hardware.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Automatic Extraction of Accurate Application-Specific Sandboxing Policy.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

DataPhone: an intelligent phone for data conferencing.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2000
Variorum: A Multimedia-Based Program Documentation System.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000


  Loading...