Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Isadora: automated information-flow property generation for hardware security verification., , , , and . J. Cryptogr. Eng., 13 (4): 391-407 (November 2023)Open-source FPGA-ML codesign for the MLPerf Tiny Benchmark., , , , , , , , , and 8 other author(s). CoRR, (2022)A Methodology For Creating Information Flow Specifications of Hardware Designs., , , , and . CoRR, (2021)Aker: A Design and Verification Framework for Safe and Secure SoC Access Control., , and . ICCAD, page 1-9. IEEE, (2021)Isadora: Automated Information Flow Property Generation for Hardware Designs., , , , and . ASHES@CCS, page 5-15. ACM, (2021)ChimpACT: A Longitudinal Dataset for Understanding Chimpanzee Behaviors., , , , , , , , and . NeurIPS, (2023)Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies., and . CPS-IoT Week Workshops, page 198-202. ACM, (2023)Applications and Techniques for Fast Machine Learning in Science., , , , , , , , , and 77 other author(s). CoRR, (2021)Pentimento: Data Remanence in Cloud FPGAs., , , , , , and . CoRR, (2023)Security Verification of the OpenTitan Hardware Root of Trust., , , , and . IEEE Secur. Priv., 21 (3): 27-36 (May 2023)