From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . CoRR, (2019)Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants., , и . AsiaCCS, стр. 465-478. ACM, (2019)ACM CCS 2016 Interviews, Part 1., и . IEEE Secur. Priv., 15 (2): 88-91 (2017)Security & Privacy Week Interviews, Part 1., и . IEEE Secur. Priv., 14 (5): 58-67 (2016)Digital contact Tracing solutions: Promises, Pitfalls and Challenges., , , , и . ArXiv I arXiv 2202.06698v2 (October 2022), (октября 2022)Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures., , , , и . CoRR, (2021)WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors., , , , , , , и . CoRR, (2024)To ChatGPT, or not to ChatGPT: That is the question!, , , и . CoRR, (2023)Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms., , , и . WebSci, стр. 346-356. ACM, (2023)DMA'n'Play: Practical Remote Attestation Based on Direct Memory Access., , , и . ACNS, том 13906 из Lecture Notes in Computer Science, стр. 32-61. Springer, (2023)