Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security., , , , and . IEEE Symposium on Security and Privacy, page 20-38. IEEE, (2019)A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs., , , , , and . ACSAC, page 345-359. ACM, (2020)To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention., , , , , and . SIGCSE, page 1135-1141. ACM, (2021)Speculative trade under ambiguity.. J. Econ. Theory, (2022)Principles of financial economics, and . Cambridge Univ. Press, Cambridge u.a., (2001)Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks., , , , , , and . EuroS&P, page 167-182. IEEE, (2018)A simple axiomatization of risk-averse expected utility. Economics Letters, 88 (1): 73--77 (July 2005)The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves., , , , and . AsiaCCS, page 73-85. ACM, (2019)The envelope theorem, Euler and Bellman equations, without differentiability., and . J. Econ. Theory, (2021)Portfolio characterization of risk aversion, and . Economics Letters, 45 (2): 259--265 (June 1994)