Author of the publication

Leakage Resilience against Concurrent Cache Attacks.

, , , and . POST, volume 8414 of Lecture Notes in Computer Science, page 140-158. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3., , , , and . CoRR, (2017)NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints., , and . CoRR, (2017)TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition., , , , , and . MIST@CCS, page 45-56. ACM, (2017)Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications., , , , , and . Int. J. Inf. Sec., 20 (2): 181-197 (2021)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , and . Int. J. Inf. Sec., 22 (6): 1665-1685 (December 2023)NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints., , and . ACM Trans. Priv. Secur., 24 (1): 2:1-2:35 (2020)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , and . Int. J. Crit. Infrastructure Prot., (2021)Automatic Quantification of Cache Side-Channels., , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 564-580. Springer, (2012)Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 373-392. Springer, (2018)Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots., , , , , , and . CODASPY, page 85-96. ACM, (2019)