Author of the publication

Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware.

, , , and . EuroS&P, page 369-384. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SaMW: a probabilistic meta-heuristic algorithm for job scheduling in heterogeneous distributed systems powered by microservices., and . Clust. Comput., 24 (3): 1735-1759 (2021)SGXCrypter: IP protection for portable executables using Intel's SGX technology., , and . ASP-DAC, page 354-359. IEEE, (2017)Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers., and . ICCD, page 33-36. IEEE, (2020)Simulation and performance evaluation of a fog system., and . FMEC, page 26-33. IEEE, (2018)Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree., and . ICECS, page 477-480. IEEE, (2018)ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications., , and . USENIX Security Symposium, page 2847-2862. USENIX Association, (2021)High performance system based on Cloud and beyond: Jungle Computing., and . J. Comput. Sci., (2017)LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems., , and . IOLTS, page 194-199. IEEE, (2019)A Scheduling Algorithm for a Fog Computing System with Bag-of-Tasks Jobs: Simulation and Performance Evaluation., and . Simul. Model. Pract. Theory, (2020)Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software Applications., , , , and . CPSIOTSEC@CCS, page 83-89. ACM, (2023)