From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of IoT Frameworks using Static Taint Analysis., и . CODASPY, стр. 203-213. ACM, (2022)Detecting Hardware Trojans using Model Guided Symbolic Execution., и . ACM Great Lakes Symposium on VLSI, стр. 569-573. ACM, (2024)ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (2): 1577-1595 (марта 2023)Specification, verification, and synthesis using extended state machines with callbacks., и . MEMOCODE, стр. 95-104. IEEE, (2016)DTjRTL: A Configurable Framework for Automated Hardware Trojan Insertion at RTL., , , , и . ACM Great Lakes Symposium on VLSI, стр. 465-470. ACM, (2024)Extracting configuration parameter interactions using static analysis., , , и . ICPC, стр. 1-4. IEEE Computer Society, (2016)Heuristics for Selecting Predicates for Partial Predicate Abstraction., и . CoRR, (2018)A Symbolic Approach to Detecting Hardware Trojans Triggered by Don't Care Transitions., и . ACM Trans. Design Autom. Electr. Syst., 28 (2): 28:1-28:31 (марта 2023)Verifying Absence of Hardware-Software Data Races using Counting Abstraction.. MEMOCODE, стр. 1-6. IEEE, (2020)MMIO Access-Based Coverage for Firmware Analysis., и . CNS, стр. 1-9. IEEE, (2023)