Author of the publication

Tamper Evident Microprocessors.

, and . IEEE Symposium on Security and Privacy, page 173-188. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification., , , and . DAC, page 175:1-175:4. ACM, (2014)Silencing Hardware Backdoors., and . IEEE Symposium on Security and Privacy, page 49-63. IEEE Computer Society, (2011)A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security., , , and . IEEE Micro, 33 (3): 68-77 (2013)On the feasibility of online malware detection with performance counters., , , , , , and . ISCA, page 559-570. ACM, (2013)FANCI: identification of stealthy malicious logic using boolean functional analysis., , and . ACM Conference on Computer and Communications Security, page 697-708. ACM, (2013)Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources.. Columbia University, USA, (2014)Trustworthy hardware from untrusted components., , , , and . Commun. ACM, 58 (9): 60-71 (2015)Tamper Evident Microprocessors., and . IEEE Symposium on Security and Privacy, page 173-188. IEEE Computer Society, (2010)Side-channel vulnerability factor: A metric for measuring information leakage., , , and . ISCA, page 106-117. IEEE Computer Society, (2012)