Author of the publication

Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems.

, , , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 9-26. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EARIC: Exploiting ADC Registers in IoT and Control Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 245-265. Springer, (2023)ICS-SEA: Formally Modeling the Conflicting Design Constraints in ICS., and . ICSS, page 60-69. ACM, (2019)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , and . CoRR, (2020)DARUD: Detecting and Arresting Rogue USB Devices in the V2X Ecosystem., and . SOLI, page 1-6. IEEE, (2021)Attribute based access control for APIs in spring security., , , and . SACMAT, page 85-88. ACM, (2014)Enforcing Memory Safety in Cyber-Physical Systems., , , and . CyberICPS/SECPRE@ESORICS, volume 10683 of Lecture Notes in Computer Science, page 127-144. Springer, (2017)Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems., , , and . ESSoS, volume 10953 of Lecture Notes in Computer Science, page 9-26. Springer, (2018)Selective Release of Smart Metering Data in Multi-domain Smart Grids., , , , , and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 48-62. Springer, (2014)CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems., , , , and . Comput. Secur., (2020)VulnGen: Vulnerable Virtual Machine Generator., , and . SOLI, page 1-8. IEEE, (2023)