Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , and . CoRR, (2018)A Linux in unikernel clothing., , , and . EuroSys, page 11:1-11:15. ACM, (2020)You Can't Always Check What You Wanted: : Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things., and . ISORC, page 42-53. IEEE, (2023)Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems., , , , , , , , and . CoRR, (2023)TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing., , , and . CoRR, (2023)Preserving Physical Safety Under Cyber Attacks., , , , , and . IEEE Internet Things J., 6 (4): 6285-6300 (2019)Worst-case execution time analysis of security policies for deeply embedded real-time systems.. SIGBED Rev., 5 (1): 8 (2008)A generalized model for preventing information leakage in hard real-time systems., , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)Temporal Analysis for Adapting Concurrent Applications to Embedded Systems., and . ECRTS, page 71-82. IEEE Computer Society, (2008)Verified programs can party: optimizing kernel extensions via post-verification merging., , , , , and . EuroSys, page 283-299. ACM, (2022)