Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Secure Distributed Trust Management on a Global Scale: An analytical approach for applying Distributed Ledgers for authorization in the IoT., , and . IoT S&P@SIGCOMM, page 49-54. ACM, (2018)Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations., , , , , , , , , and 1 other author(s). WWW, page 1668-1679. ACM, (2024)Network entity characterization and attack prediction., , , and . Future Gener. Comput. Syst., (2019)The Tip of the Iceberg: On the Merits of Finding Security Bugs., , , and . ACM Trans. Priv. Secur., 24 (1): 3:1-3:33 (2020)Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection., , , , , , and . IEEE Access, (2018)Public Privacy and Brick Houses Made of Glass., , , , , and . IFIPTM, volume 528 of IFIP Advances in Information and Communication Technology, page 137-148. Springer, (2018)Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 2867-2884. USENIX Association, (2023)Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry., , , , , and . UIC/ATC, page 627-632. IEEE Computer Society, (2012)More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System., , , , and . CSCS, page 7:1-7:9. ACM, (2022)Monitoring Automotive Software Security Health through Trustworthiness Score., , , , , , , , and . CSCS, page 1:1-1:9. ACM, (2023)