From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Review and Comparison of AI-enhanced Side Channel Analysis., , , и . ACM J. Emerg. Technol. Comput. Syst., 18 (3): 62:1-62:20 (2022)Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices., , , , , и . CoRR, (2024)A Review and Comparison of AI Enhanced Side Channel Analysis., , , и . CoRR, (2024)LightEMU: Hardware Assisted Fuzzing of Trusted Applications., , , , , , и . CoRR, (2023)PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network., , , , , и . IEEE Trans. Inf. Forensics Secur., (2023)SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 4078-4089 (2020)HeisenTrojans: They Are Not There Until They Are Triggered., , , , и . AsianHOST, стр. 1-7. IEEE, (2023)When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit., , и . AsianHOST, стр. 1-6. IEEE, (2023)LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells., , , и . HOST, стр. 305-315. IEEE, (2020)CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight., , , , , , и . J. Hardw. Syst. Secur., 7 (2): 44-54 (сентября 2023)