Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Strong Memristor-based Physically Unclonable Functions., , , and . DAC, page 1-6. IEEE, (2020)Avoid a Void: The Eradication of Null Dereferencing., , and . Reflections on the Work of C. A. R. Hoare, Springer, (2010)SafeTEE: Combining Safety and Security on ARM-based Microcontrollers., , , , and . DATE, page 520-525. IEEE, (2022)New Microsoft Component Technologies., and . TOOLS (34), page 393-394. IEEE Computer Society, (2000)DARWIN: Survival of the Fittest Fuzzing Mutators., , , , and . CoRR, (2022)Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures., , , , , , , and . DAC, page 985-990. IEEE, (2021)SANCTUARY: ARMing TrustZone with User-space Enclaves., , , , and . NDSS, The Internet Society, (2019)DARWIN: Survival of the Fittest Fuzzing Mutators., , , , and . NDSS, The Internet Society, (2023)INVITED: AI Utopia or Dystopia - On Securing AI Platforms., , , , and . DAC, page 1-6. IEEE, (2020)Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures., , , , and . CoRR, (2021)