From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation., , , , и . CCS, стр. 3269-3283. ACM, (2022)CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution., , , , и . ICDCS, стр. 84-95. IEEE, (2023)Towards Artificial General Intelligence (AGI) in the Internet of Things (IoT): Opportunities and Challenges., , , , , , , , , и 15 other автор(ы). CoRR, (2023)TF-BIV: transparent and fine-grained binary integrity verification in the cloud., , , , , и . ACSAC, стр. 57-69. ACM, (2019)Exploiting Insurance Telematics for Fun and Profit., , , , , , , и . CoRR, (2016)LLMs for Coding and Robotics Education., , , , , , , , , и 3 other автор(ы). CoRR, (2024)Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels., , , , и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 229-244. Springer, (2013)Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory., , , , , , и . IEEE Trans. Dependable Secur. Comput., 18 (3): 1196-1213 (2021)Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis., , , , , , , , и . ISSTA, стр. 360-372. ACM, (2023)Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection., , , и . ISC, том 11060 из Lecture Notes in Computer Science, стр. 213-230. Springer, (2018)