Cited By
View all- Xia THu HWu DBalzarotti DXu W(2024)DEEPTYPEProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699229(5877-5894)Online publication date: 14-Aug-2024
- Valdez EAhmed SGu Zde Dinechin CCheng PJamjoom HLuo BLiao XXu JKirda ELie D(2024)Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670352(1390-1404)Online publication date: 2-Dec-2024
- Yu JXie XZhang CChen SLi YShen WChristakis MPradel M(2024)Bugs in Pods: Understanding Bugs in Container Runtime SystemsProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680366(1364-1376)Online publication date: 11-Sep-2024