Author of the publication

Profit: Detecting and Quantifying Side Channels in Networked Applications.

, , , and . NDSS, The Internet Society, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing., , , , , and . IEEE Softw., 41 (1): 98-104 (January 2024)Attack Synthesis for Strings using Meta-Heuristics., , , , and . ACM SIGSOFT Softw. Eng. Notes, 43 (4): 56 (2018)Attack Synthesis for Strings using Meta-Heuristics., , , , and . CoRR, (2019)Feedback-driven side-channel analysis for networked applications., , and . ISSTA, page 260-271. ACM, (2020)The Java Pathfinder Workshop 2019., , , , , , , , , and 28 other author(s). ACM SIGSOFT Softw. Eng. Notes, 45 (2): 20-22 (2020)Targeted Black-Box Side-Channel Mitigation for IoT✱., , , , and . IOT, page 49-56. ACM, (2022)Symbolic Execution for Importance Analysis and Adversarial Generation in Neural Networks., , , , , and . ISSRE, page 313-322. IEEE, (2019)Case Study: Analysis of Autonomous Center Line Tracking Neural Networks., , , and . VSTTE, volume 13124 of Lecture Notes in Computer Science, page 104-121. Springer, (2021)CorbFuzz: Checking Browser Security Policies with Fuzzing., , , and . ASE, page 215-226. IEEE, (2021)Incremental Adaptive Attack Synthesis., , , , and . CoRR, (2019)