Author of the publication

Towards Efficient Auditing for Real-Time Systems.

, , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 614-634. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving Physical Safety Under Cyber Attacks., , , , , and . IEEE Internet Things J., 6 (4): 6285-6300 (2019)A Linux in unikernel clothing., , , and . EuroSys, page 11:1-11:15. ACM, (2020)Worst-case execution time analysis of security policies for deeply embedded real-time systems.. SIGBED Rev., 5 (1): 8 (2008)REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , and . CoRR, (2018)TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing., , , and . CoRR, (2023)Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems., , , , , , , , and . CoRR, (2023)You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things., and . ISORC, page 42-53. IEEE, (2023)Verified programs can party: optimizing kernel extensions via post-verification merging., , , , , and . EuroSys, page 283-299. ACM, (2022)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)Temporal Analysis for Adapting Concurrent Applications to Embedded Systems., and . ECRTS, page 71-82. IEEE Computer Society, (2008)