Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Systematic Design of Collective Remote Attestation Protocols., , , , , and . ICDCS, page 1188-1198. IEEE, (2019)On the Root of Trust Identification Problem., , and . IPSN, page 315-327. ACM, (2021)ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation., , and . USENIX Security Symposium, page 5827-5844. USENIX Association, (2023)Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems., , and . ESORICS (1), volume 14344 of Lecture Notes in Computer Science, page 290-312. Springer, (2023)Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA., , , and . SP, page 2413-2429. IEEE, (2022)DIALED: Data Integrity Attestation for Low-end Embedded Devices., , and . DAC, page 313-318. IEEE, (2021)SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation., , and . CoRR, (2024)Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation., , , and . WISEC, page 37-47. ACM, (2021)$DiCA$: A Hardware-Software Co-Design for Differential Check-Pointing in Intermittently Powered Devices., , , and . ICCAD, page 1-9. IEEE, (2023)On the TOCTOU Problem in Remote Attestation., , , and . CCS, page 2921-2936. ACM, (2021)