From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . CoRR, (2019)ACM CCS 2016 Interviews, Part 1., и . IEEE Secur. Priv., 15 (2): 88-91 (2017)Security & Privacy Week Interviews, Part 1., и . IEEE Secur. Priv., 14 (5): 58-67 (2016)Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants., , и . AsiaCCS, стр. 465-478. ACM, (2019)Digital contact Tracing solutions: Promises, Pitfalls and Challenges., , , , и . ArXiv I arXiv 2202.06698v2 (October 2022), (октября 2022)WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors., , , , , , , и . CoRR, (2024)To ChatGPT, or not to ChatGPT: That is the question!, , , и . CoRR, (2023)Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures., , , , и . CoRR, (2021)FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants., , , , , и . CCS, стр. 1861-1883. ACM, (2021)RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints., , , , и . CCS, стр. 2890-2905. ACM, (2021)