Author of the publication

Sensei: Enforcing secure coding guidelines in the integrated development environment.

, , , and . Softw. Pract. Exp., 50 (9): 1682-1718 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack simulation based software protection assessment method., , , , , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)., , , and . Dagstuhl Reports, 9 (8): 1-25 (2019)Obfuscated integration of software protections., , and . Int. J. Inf. Sec., 20 (1): 73-101 (2021)Coarse-Grained Reconfigurable Array Architectures., , and . Handbook of Signal Processing Systems, Springer, (2013)ΔBreakpad: Diversified Binary Crash Reporting., , , , and . CoRR, (2017)Extended Report on the Obfuscated Integration of Software Protections., , and . CoRR, (2019)Protecting Your Software Updates., , and . IEEE Secur. Priv., 11 (2): 47-54 (2013)A Bimodal Scheduler for Coarse-Grained Reconfigurable Arrays., and . ACM Trans. Archit. Code Optim., 13 (2): 15:1-15:26 (2016)Effective Extensible Programming: Unleashing Julia on GPUs., , and . IEEE Trans. Parallel Distributed Syst., 30 (4): 827-841 (2019)An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors., , , , , , and . J. Signal Process. Syst., 61 (2): 157-179 (2010)