Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expanding Gate Level Information Flow Tracking for Multilevel Security., , , , and . IEEE Embed. Syst. Lett., 5 (2): 25-28 (2013)Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions., , , , , , , and . VTS, page 1-10. IEEE, (2021)Security Verification of the OpenTitan Hardware Root of Trust., , , , and . IEEE Secur. Priv., 21 (3): 27-36 (May 2023)Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security., , , , , , , , and . ISCA, page 189-200. ACM, (2011)Minimal Multi-threading: Finding and Removing Redundant Instructions in Multi-threaded Processors., , , , , , and . MICRO, page 337-348. IEEE Computer Society, (2010)Gate-Level Information Flow Tracking for Security Lattices., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (1): 2:1-2:25 (2014)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , and . IEEE Des. Test, 30 (2): 55-62 (2013)Detecting Hardware Trojans with Gate-Level Information-Flow Tracking., , , and . Computer, 49 (8): 44-52 (2016)Simultaneous information flow security and circuit redundancy in Boolean gates., , , and . ICCAD, page 585-590. ACM, (2012)A software-based dynamic-warp scheduling approach for load-balancing the Viola-Jones face detection algorithm on GPUs., , , , and . J. Parallel Distributed Comput., 73 (5): 677-685 (2013)