Author of the publication

The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection.

, , , and . SYSTOR, page 1:1-1:12. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TaskShuffler++: Real-Time Schedule Randomization for Reducing Worst-Case Vulnerability to Timing Inference Attacks., , , and . CoRR, (2019)Real-Time Computing on Multicore Processors., , , , , , , , , and 1 other author(s). Computer, 49 (9): 69-77 (2016)Blinder: Partition-Oblivious Hierarchical Scheduling., , , , and . USENIX Security Symposium, page 2417-2434. USENIX Association, (2021)Optimizing Tunable WCET with Shared Resource Allocation and Arbitration in Hard Real-Time Multicore Systems., , and . RTSS, page 227-238. IEEE Computer Society, (2011)ABC: Abstract prediction Before Concreteness., , , and . DATE, page 1103-1108. IEEE, (2020)ADLP: Accountable Data Logging Protocol for Publish-Subscribe Communication Systems., and . ICDCS, page 1149-1160. IEEE, (2019)Grouped Convolutional Neural Networks for Multivariate Time Series., , , and . CoRR, (2017)A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems., , , , , , and . CoRR, (2017)Virtual timeline: a formal abstraction for verifying preemptive schedulers with temporal isolation., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 20:1-20:31 (2020)Sensor Placement for 3-Coverage with Minimum Separation Requirements., , , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 266-281. Springer, (2008)