Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks., , and . EuroS&P, page 671-686. IEEE, (2023)Hardware Security Evaluation Using Assurance Case Models., , , and . ARES, page 193-198. IEEE Computer Society, (2015)T-DRE: a hardware trusted computing base for direct recording electronic vote machines., , , , , and . ACSAC, page 191-198. ACM, (2010)A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)FORTUNA - A framework for the design and development of hardware-based secure systems., , and . J. Syst. Softw., 86 (8): 2063-2076 (2013)ACBuilder: A tool for hardware architecture security evaluation., , , , and . HOST, page 97-102. IEEE Computer Society, (2016)FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems., , and . NSS, page 184-191. IEEE, (2011)You Cannot Always Win the Race: Analyzing the LFENCE/JMP Mitigation for Branch Target Injection., , and . CoRR, (2022)The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems., , , , , , and . CoRR, (2023)Case Study: On the Security of Key Storage on PCs., , and . TrustCom/ISPA/IUCC, page 1645-1651. IEEE Computer Society, (2013)