Shohreh Hosseinzadeh

Orcid: 0000-0002-9282-3981

According to our database1, Shohreh Hosseinzadeh authored at least 15 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Recent trends in applying TPM to cloud computing.
Secur. Priv., 2020

2018
Internal Interface Diversification as a Security Measure in Sensor Networks.
J. Sens. Actuator Networks, 2018

Diversification and obfuscation techniques for software security: A systematic literature review.
Inf. Softw. Technol., 2018

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization.
CoRR, 2018

2017
Measuring Software Security from the Design of Software.
Proceedings of the 18th International Conference on Computer Systems and Technologies, 2017

2016
Interface diversification in IoT operating systems.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Security in container-based virtualization through vTPM.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

A semantic security framework and context-aware role-based access control ontology for smart spaces.
Proceedings of the International Workshop on Semantic Big Data, 2016

A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Software Security Considerations for IoT.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

A Survey on Aims and Environments of Diversification and Obfuscation in Software Security.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
Obfuscation and Diversification for Securing Cloud Computing.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Security and Privacy in Cloud Computing via Obfuscation and Diversification: A Survey.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Symbol diversification of linux binaries.
Proceedings of the 2014 World Congress on Internet Security, 2014

Diversification of System Calls in Linux Binaries.
Proceedings of the Trusted Systems - 6th International Conference, 2014


  Loading...