Author of the publication

FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets.

, , , , and . HOST, page 48-51. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized event notification in CAN through in-frame replies and Bloom filters., , , , and . WFCS, page 1-10. IEEE, (2017)LockDown: an operating system for achieving service continuity by quarantining principals., , and . EUROSEC, page 7:1-7:6. ACM, (2016)Survey of Automotive Controller Area Network Intrusion Detection Systems., , , and . IEEE Des. Test, 36 (6): 48-55 (2019)Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware., , , , , and . CCWC, page 467-473. IEEE, (2024)Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network., , , , , , and . AutoSec@CODASPY, page 25-30. ACM, (2019)SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems., , and . DSN, page 227-238. IEEE Computer Society, (2016)Shared hardware data structures for hard real-time systems., , , and . EMSOFT, page 133-142. ACM, (2012)Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard., and . ISORC, page 98-105. IEEE, (2020)Survey of Interoperability Challenges in the Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (12): 22838-22861 (2022)L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks., , and . IoTDI, page 464-465. ACM, (2023)