Author of the publication

Software-based control flow error detection and correction using branch triplication.

, , , and . IOLTS, page 214-217. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Opportunities for Compilers in Computer Security., , , , , and . LCPC, volume 11882 of Lecture Notes in Computer Science, page 54-60. Springer, (2018)TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks., , and . HOST, page 72-77. IEEE Computer Society, (2015)Digital fingerprints for low-cost platforms using MEMS sensors., , , , and . WESS, page 2:1-2:6. ACM, (2013)Towards the Detection of Malicious URL and Domain Names Using Machine Learning., , and . DoCEIS, volume 577 of IFIP Advances in Information and Communication Technology, page 109-117. Springer, (2020)Differential Fault Intensity Analysis., , , and . FDTC, page 49-58. IEEE Computer Society, (2014)A Configurable and Lightweight Timing Monitor for Fault Attack Detection., , , , , and . ISVLSI, page 461-466. IEEE Computer Society, (2016)Analyzing and eliminating the causes of fault sensitivity analysis., , and . DATE, page 1-6. European Design and Automation Association, (2014)Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy., , , and . SAC, volume 10532 of Lecture Notes in Computer Science, page 231-244. Springer, (2016)SAFE-HEALTH: A Secure Framework for Advancing Edge-Based Health 5.0., , , , and . WF-IoT, page 1-6. IEEE, (2023)Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers., , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 174-188. Springer, (2015)