From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CPAC: securing critical infrastructure with cyber-physical access control., , , , и . ACSAC, стр. 139-152. ACM, (2016)Towards Improving Container Security by Preventing Runtime Escapes., , , и . SecDev, стр. 38-46. IEEE, (2021)BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy., , , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution., , , , и . CCS, стр. 2245-2262. ACM, (2017)ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 273-290. USENIX Association, (2018)M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles., , , , , и . USENIX Security Symposium, стр. 285-302. USENIX Association, (2021)A Hybrid Approach to Secure Function Evaluation using SGX., , , , , , , и . AsiaCCS, стр. 100-113. ACM, (2019)LBM: A Security Framework for Peripherals within the Linux Kernel., , , , , и . IEEE Symposium on Security and Privacy, стр. 967-984. IEEE, (2019)Toward Automated Firmware Analysis in the IoT Era., , , , , и . IEEE Secur. Priv., 17 (5): 38-46 (2019)ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (2): 1577-1595 (марта 2023)