Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS., and . ICSS, page 60-69. ACM, (2019)Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS., , , , and . CoRR, (2018)EARIC: Exploiting ADC Registers in IoT and Control Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 245-265. Springer, (2023)Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems., , , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 9-26. Springer, (2018)Enforcing Memory Safety in Cyber-Physical Systems., , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 127-144. Springer, (2017)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , and . Int. J. Crit. Infrastructure Prot., (2021)Attribute based access control for APIs in spring security., , , and . SACMAT, page 85-88. ACM, (2014)DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem., and . SOLI, page 1-6. IEEE, (2021)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , and . CoRR, (2020)On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies., , , and . Comput. Secur., (May 2023)