Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , and . CoRR, (2018)A Linux in unikernel clothing., , , and . EuroSys, page 11:1-11:15. ACM, (2020)Preserving Physical Safety Under Cyber Attacks., , , , , and . IEEE Internet Things J., 6 (4): 6285-6300 (2019)Worst-case execution time analysis of security policies for deeply embedded real-time systems.. SIGBED Rev., 5 (1): 8 (2008)TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing., , , and . CoRR, (2023)Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems., , , , , , , , and . CoRR, (2023)You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things., and . ISORC, page 42-53. IEEE, (2023)Verified programs can party: optimizing kernel extensions via post-verification merging., , , , , and . EuroSys, page 283-299. ACM, (2022)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)Temporal Analysis for Adapting Concurrent Applications to Embedded Systems., and . ECRTS, page 71-82. IEEE Computer Society, (2008)