Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks., , , , and . IEEE Embed. Syst. Lett., 10 (3): 83-86 (2018)Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance., , , , and . CoRR, (2022)White Mirror: Leaking Sensitive Information from Interactive Netflix Movies using Encrypted Traffic Analysis., , , , and . SIGCOMM Posters and Demos, page 122-124. ACM, (2019)FadingBF: A Bloom Filter With Consistent Guarantees for Online Applications., , , and . IEEE Trans. Computers, 71 (1): 40-52 (2022)GANDALF: A fine-grained hardware-software co-design for preventing memory attacks., , , and . CoRR, (2017)Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 3734-3752 (September 2023)ApproxBC: Blockchain Design Alternatives for Approximation-Tolerant Resource-Constrained Applications., , , , and . IEEE Communications Standards Magazine, 2 (3): 45-51 (2018)Depending on HTTP/2 for Privacy? Good Luck!, , , , and . DSN, page 278-285. IEEE, (2020)Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks., , , and . Comput. Commun., (2020)Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection., , , and . ICCAD, page 1-8. ACM, (2019)