Author of the publication

AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.

, , , , and . RAID, page 235-250. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults., , and . CoRR, (2020)ProPoS: A Probabilistic Proof-of-Stake Protocol., , , , and . CoRR, (2020)Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext., and . Int. J. Inf. Sec., 20 (2): 141-159 (2021)VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research., , , and . Veh. Commun., (October 2023)File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation., , , and . Int. J. Inf. Sec., 18 (6): 701-713 (2019)SCARR: A Novel Scalable Runtime Remote Attestation., , , , and . CoRR, (2018)Towards Semantic Sensitive Feature Profiling of IoT Devices., , and . IEEE Internet Things J., 6 (5): 8056-8064 (2019)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 9 (1): 212-225 (2021)Non-Intrusive Protection for Legacy SCADA Systems., and . IEEE Commun. Mag., 61 (6): 36-42 (June 2023)Post-Quantum Adversarial Modeling: A User's Perspective., , , and . Computer, 56 (8): 58-67 (August 2023)