Author of the publication

Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.

, , , , and . USENIX Security Symposium, page 661-678. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulations of levelled RFID localisation for indoor moving objects., and . IJRFITA, 4 (3): 213-228 (2014)Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles., , , , , and . DSN, page 67-80. IEEE, (2023)PAtt: Physics-based Attestation of Control Systems., , , , , , , , and . RAID, page 165-180. USENIX Association, (2019)User density and spatial cloaking algorithm selection: Improving privacy protection of mobile users., , and . Sarnoff Symposium, page 1-2. IEEE, (2016)A Diagonally Updated Limited-Memory Quasi-Newton Method for the Weighted Density Approximation., , , and . Comput., 5 (4): 42 (2017)Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing., , , , , and . RAID, page 428-441. ACM, (2021)CalmMeNow: exploratory research and design of stress mitigating mobile interventions., and . CHI Extended Abstracts, page 1699-1704. ACM, (2011)Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations., , , , , , , and . CoRR, (2023)Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices., , , , , , , , , and . CoRR, (2022)Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems., , , , and . ICONIP (5), volume 14451 of Lecture Notes in Computer Science, page 188-201. Springer, (2023)