Author of the publication

Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards.

, , , and . IAS, page 125-130. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware and software support for fine-grained memory access control and encapsulation in C++., , and . SPLASH (Companion Volume), page 81-82. ACM, (2013)Architectural support for securing application data in embedded systems., , , and . EIT, page 19-24. IEEE, (2008)Automation for Creating and Configuring Security Manifests for Hardware Containers., , and . SafeConfig, IEEE, (2011)A compiler-hardware approach to software protection for embedded systems., , , and . Comput. Electr. Eng., 35 (2): 315-328 (2009)No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains., , , and . DSD, page 163-170. IEEE Computer Society, (2012)Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking., and . SECRYPT, page 165-170. SciTePress, (2010)Hardware-enforced fine-grained isolation of untrusted code., , , , and . SecuCode@CCS, page 11-18. ACM, (2009)On the Privacy Threats of Electronic Poll Books., , and . SECRYPT, page 281-286. SciTePress, (2011)Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards., , , and . IAS, page 125-130. IEEE, (2010)Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems., , , , and . CSE (2), page 830-836. IEEE Computer Society, (2009)