Author of the publication

A methodology for determining the image base of ARM-based industrial control system firmware.

, , , , and . Int. J. Crit. Infrastructure Prot., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions., , , and . IACR Cryptology ePrint Archive, (2013)Tracing Android Kernel Codes at Early Stage without Extra Hardware Components., , , , and . DSC, page 210-216. IEEE, (2019)A feature-vector generative adversarial network for evading PDF malware classifiers., , , , and . Inf. Sci., (2020)The security of machine learning in an adversarial setting: A survey., , , , and . J. Parallel Distributed Comput., (2019)Identification of NAND flash ECC algorithms in mobile devices., , and . Digit. Investig., 9 (1): 34-48 (2012)Stealthy Low-frequency Backdoor Attack against Deep Neural Networks., , , , and . CoRR, (2023)An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers., , , , , and . Mob. Networks Appl., 26 (4): 1616-1629 (2021)Improving the Transferability of Adversarial Examples with Restructure Embedded Patches., , , , , and . CoRR, (2022)An end-to-end covert channel via packet dropout for mobile networks., , , , , and . Int. J. Distributed Sens. Networks, (2018)Cryptographic key protection against FROST for mobile devices., , , , , , and . Clust. Comput., 20 (3): 2393-2402 (2017)