Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing., , , , and . DAC, page 1379-1383. ACM, (2022)PSOFuzz: Fuzzing Processors with Particle Swarm Optimization., , , , and . ICCAD, page 1-9. IEEE, (2023)LLM-assisted Generation of Hardware Assertions., , , , , , and . CoRR, (2023)(Security) Assertions by Large Language Models., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities., , , , , , and . USENIX Security Symposium, page 3219-3236. USENIX Association, (2022)WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors., , , , , , , and . CoRR, (2024)MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors., , , , and . CoRR, (2023)HyPFuzz: Formal-Assisted Processor Fuzzing., , , , , , and . USENIX Security Symposium, page 1361-1378. USENIX Association, (2023)Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned., , and . ACM Great Lakes Symposium on VLSI, page 95-100. ACM, (2021)Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing., , , , , and . CoRR, (2024)