Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BSRNG: A High Throughput Parallel BitSliced Approach for Random Number Generators., , , , , and . ICPP Workshops, page 12:1-12:10. ACM, (2020)On Using Monte-Carlo Tree Search to Solve Puzzles., , , , , , , , , and . ICCTA, page 18-26. ACM, (2021)A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel Attack., , , , and . CoRR, (2020)Multi-Agent non-Overlapping Pathfinding with Monte-Carlo Tree Search., , , , and . CoG, page 1-4. IEEE, (2019)LeakyOhm: Secret Bits Extraction using Impedance Analysis., , and . CCS, page 1675-1689. ACM, (2023)HyperDbg: Reinventing Hardware-Assisted Debugging., , , , , , , , , and . CCS, page 1709-1723. ACM, (2022)A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting., , , , and . CRiSIS, volume 13204 of Lecture Notes in Computer Science, page 38-54. Springer, (2021)HyperDbg: Reinventing Hardware-Assisted Debugging., , , , , , , , , and . CoRR, (2022)Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis., , , and . IACR Cryptol. ePrint Arch., (2023)Unlucky Explorer: A Complete non-Overlapping Map Exploration., , , , , , , , and . WSSE, page 150-154. ACM, (2021)