Author of the publication

Reverse Engineering IoT Devices: Effective Techniques and Methods.

, , , , and . IEEE Internet of Things Journal, 5 (6): 4965-4976 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can the Operator of a Drone Be Located by Following the Drone's Path?, , and . CSCML, volume 12161 of Lecture Notes in Computer Science, page 85-93. Springer, (2020)Sensor Defense In-Software (SDI): Practical software based detection of spoofing attacks on position sensors., , , , , , , , and . Eng. Appl. Artif. Intell., (2020)Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor., , , , , , , , and . CoRR, (2019)Robust Website Fingerprinting Through the Cache Occupancy Channel., , , , , , and . CoRR, (2018)Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2042-2060 (2021)Website Fingerprinting - Last Level Cache Contention Traces., , , , , , and . (September 2019)Inner conflict: How smart device components can cause harm., , , and . Comput. Secur., (2020)Port Contention Goes Portable: Port Contention Side Channels in Web Browsers., , , and . AsiaCCS, page 1182-1194. ACM, (2022)Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses., , , , , and . USENIX Security Symposium, page 2863-2880. USENIX Association, (2021)Cross-Router Covert Channels., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)