From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA., , , и . IEEE Trans. Inf. Forensics Secur., (2021)CPU to FPGA Power Covert Channel in FPGA-SoCs., , и . IACR Cryptol. ePrint Arch., (2023)Golden Model-Free Hardware Trojan Detection by Classification of Netlist Module Graphs., , и . DATE, стр. 1317-1322. IEEE, (2022)Open Source Hardware Design and Hardware Reverse Engineering: A Security Analysis., , , , и . DSD, стр. 504-512. IEEE, (2022)An embedded key management system for PUF-based security enclosures., , , и . MECO, стр. 1-6. IEEE, (2018)Breaking TrustZone Memory Isolation through Malicious Hardware on a Modern FPGA-SoC., , , и . ASHES@CCS, стр. 3-12. ACM, (2019)Improving on State Register Identification in Sequential Hardware Reverse Engineering., , и . HOST, стр. 151-160. IEEE, (2019)Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks., , и . HOST, стр. 316-327. IEEE, (2020)TimingCamouflage+: Netlist Security Enhancement with Unconventional Timing (with Appendix)., , , , , , , и . CoRR, (2020)Counteract Side-Channel Analysis of Neural Networks by Shuffling., , и . DATE, стр. 1305-1310. IEEE, (2022)