Author of the publication

Invited - Specification and modeling for systems-on-chip security verification.

, and . DAC, page 66:1-66:6. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-efficient redundant execution for chip multiprocessors., , , and . ACM Great Lakes Symposium on VLSI, page 143-146. ACM, (2010)Verification of Authenticated Firmware Loaders., , and . FMCAD, page 110-119. IEEE, (2019)A Formal Approach to Secure Speculation., , , and . CSF, page 288-303. IEEE, (2019)Lazy Self-composition for Security Verification., , , , and . CAV (2), volume 10982 of Lecture Notes in Computer Science, page 136-156. Springer, (2018)Verifying information flow properties of firmware using symbolic execution., , , , and . DATE, page 337-342. IEEE, (2016)Adaptive execution assistance for multiplexed fault-tolerant chip multiprocessors., , , and . ICCD, page 419-426. IEEE Computer Society, (2011)Verification of Quantitative Hyperproperties Using Trace Enumeration Relations., , and . CAV (1), volume 12224 of Lecture Notes in Computer Science, page 201-224. Springer, (2020)Malware detection using machine learning based analysis of virtual memory access patterns., , , and . DATE, page 169-174. IEEE, (2017)Invited - Specification and modeling for systems-on-chip security verification., and . DAC, page 66:1-66:6. ACM, (2016)Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding., , , and . DSN, page 121-130. IEEE Computer Society, (2010)