Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Flow Control for Database-Backed Applications., , , , and . EuroS&P, page 79-94. IEEE, (2019)Evolutionary Testing of PHP Web Applications with WETT., , , and . SSBSE, volume 7515 of Lecture Notes in Computer Science, page 285-291. Springer, (2012)Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts., , , , and . CCS, page 2128-2142. ACM, (2023)Automatic Detection of Speculative Execution Combinations., , and . CCS, page 965-978. ACM, (2022)AURORA: AUtomatic RObustness coveRage Analysis Tool., , and . ICST, page 463-470. IEEE Computer Society, (2013)CacheQuery: Learning Replacement Policies from Hardware Caches., , , and . CoRR, (2019)Strong and Provably Secure Database Access Control., , and . EuroS&P, page 163-178. IEEE, (2016)Optimal Security-Aware Query Processing., and . Proc. VLDB Endow., 7 (12): 1307-1318 (2014)Model-Driven Testing for Web Applications Using Abstract State Machines., , , , and . ICWE Workshops, volume 7703 of Lecture Notes in Computer Science, page 71-78. Springer, (2012)Strong and Provably Secure Database Access Control., , and . CoRR, (2015)