Author of the publication

Automated black-box detection of side-channel vulnerabilities in web applications.

, and . ACM Conference on Computer and Communications Security, page 263-274. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Impact of Clutter in Euler Diagrams., , , and . Diagrams, volume 8578 of Lecture Notes in Computer Science, page 108-122. Springer, (2014)A Locally Nameless Visual Lambda-calculus.. DMS, page 188-193. Knowledge Systems Institute, (2013)PaL Diagrams: A Linear Diagram-Based Visual Language., , and . DMS, page 310-320. Knowledge Systems Institute Graduate School, (2014)Evaluating Colour in Concept Diagrams., , , , , , and . Diagrams, volume 13462 of Lecture Notes in Computer Science, page 168-184. Springer, (2022)Creating a Second Order Diagrammatic Logic., and . Diagrams, volume 6170 of Lecture Notes in Computer Science, page 298-300. Springer, (2010)IT Governance as a Higher Order Capability., and . PACIS, page 150. (2015)Visualizing Concepts with Euler Diagrams., , , and . Diagrams, volume 8578 of Lecture Notes in Computer Science, page 54-56. Springer, (2014)Benchmarking Deep Learning Models for Driver Distraction Detection., , , and . LOD (2), volume 12566 of Lecture Notes in Computer Science, page 103-117. Springer, (2020)PicoCTF: A Game-Based Computer Security Competition for High School Students., , and . 3GSE, USENIX Association, (2014)Introducing Second-Order Spider Diagrams for Defining Regular Languages., and . VL/HCC, page 159-167. IEEE Computer Society, (2010)