Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic annotation of tasks in structured code., , , , and . PACT, page 31:1-31:13. ACM, (2018)JetsonLEAP: a Framework to Measure Power on a Heterogeneous System-on-a-Chip Device., , , , , and . CoRR, (2017)Demand-driven less-than analysis., and . SBLP, page 2:1-2:8. ACM, (2017)Inference of peak density of indirect branches to detect ROP attacks., , and . CGO, page 150-159. ACM, (2016)Compiler-assisted Adaptive Program Scheduling in big.LITTLE Systems., , , and . CoRR, (2019)Speed and Precision in Range Analysis., , , and . SBLP, volume 7554 of Lecture Notes in Computer Science, page 42-56. Springer, (2012)Tainted Flow Analysis on e-SSA-Form Programs., , and . CC, volume 6601 of Lecture Notes in Computer Science, page 124-143. Springer, (2011)Efficient and Precise Dynamic Construction of Control Flow Graphs., , and . SBLP, page 19-26. ACM, (2019)Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware., , and . DSN, page 315-327. IEEE, (2019)Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems., , , , , and . SenSys, page 22:1-22:6. ACM, (2017)