Author of the publication

A generalized model for preventing information leakage in hard real-time systems.

, , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TaskShuffler++: Real-Time Schedule Randomization for Reducing Worst-Case Vulnerability to Timing Inference Attacks., , , and . CoRR, (2019)Real-Time Computing on Multicore Processors., , , , , , , , , and 1 other author(s). Computer, 49 (9): 69-77 (2016)Blinder: Partition-Oblivious Hierarchical Scheduling., , , , and . USENIX Security Symposium, page 2417-2434. USENIX Association, (2021)ABC: Abstract prediction Before Concreteness., , , and . DATE, page 1103-1108. IEEE, (2020)Optimizing Tunable WCET with Shared Resource Allocation and Arbitration in Hard Real-Time Multicore Systems., , and . RTSS, page 227-238. IEEE Computer Society, (2011)ADLP: Accountable Data Logging Protocol for Publish-Subscribe Communication Systems., and . ICDCS, page 1149-1160. IEEE, (2019)Sensor Placement for 3-Coverage with Minimum Separation Requirements., , , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 266-281. Springer, (2008)Grouped Convolutional Neural Networks for Multivariate Time Series., , , and . CoRR, (2017)A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems., , , , , , and . CoRR, (2017)Virtual timeline: a formal abstraction for verifying preemptive schedulers with temporal isolation., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 20:1-20:31 (2020)