Author of the publication

A generalized model for preventing information leakage in hard real-time systems.

, , , , , and . RTAS, page 271-282. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blinder: Partition-Oblivious Hierarchical Scheduling., , , , and . USENIX Security Symposium, page 2417-2434. USENIX Association, (2021)ABC: Abstract prediction Before Concreteness., , , and . DATE, page 1103-1108. IEEE, (2020)Optimizing Tunable WCET with Shared Resource Allocation and Arbitration in Hard Real-Time Multicore Systems., , and . RTSS, page 227-238. IEEE Computer Society, (2011)ADLP: Accountable Data Logging Protocol for Publish-Subscribe Communication Systems., and . ICDCS, page 1149-1160. IEEE, (2019)SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems., , , , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 21-32. IEEE Computer Society, (2013)TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems., , , and . RTAS, page 111-122. IEEE Computer Society, (2016)Sensor Placement for 3-Coverage with Minimum Separation Requirements., , , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 266-281. Springer, (2008)AccountNet: Accountable Data Propagation Using Verifiable Peer Shuffling.. ICDCS, page 48-61. IEEE, (2023)Secure and dependable cyber-physical system architectures. University of Illinois Urbana-Champaign, USA, (2017)TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions., , , and . DSN, page 453-465. IEEE, (2022)