Author of the publication

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.

, , , and . TrustCom/BigDataSE/ICESS, page 293-300. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing a Trojan applets in a smart card., and . J. Comput. Virol., 6 (4): 343-351 (2010)Confiance: detecting vulnerabilities in Java Card applets., , and . ARES, page 24:1-24:10. ACM, (2020)A Load Balancing Task Allocation Scheme in a Hard Real Time System.. Euro-Par, Vol. II, volume 1124 of Lecture Notes in Computer Science, page 640-643. Springer, (1996)Java Applet Correctness: A Developer-Oriented Approach., , and . FME, volume 2805 of Lecture Notes in Computer Science, page 422-439. Springer, (2003)A Formal Verification of Safe Update Point Detection in Dynamic Software Updating., , , , and . CRiSIS, volume 10158 of Lecture Notes in Computer Science, page 31-45. Springer, (2016)In-Depth Analysis of Ransom Note Files., , and . Comput., 10 (11): 145 (2021)Ransomware's Early Mitigation Mechanisms., , , , , and . ARES, page 2:1-2:10. ACM, (2018)Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code., , and . IAS, page 104-110. IEEE, (2015)When Fault Injection Collides with Hardware Complexity., , , and . FPS, volume 11358 of Lecture Notes in Computer Science, page 243-256. Springer, (2018)Enhancing Fuzzing Technique for OKL4 Syscalls Testing., , , and . ARES, page 728-733. IEEE Computer Society, (2011)