Author of the publication

Verifying Hardware Security Modules with Information-Preserving Refinement.

, , and . OSDI, page 503-519. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesizing Robust Adversarial Examples, , , and . (2017)cite arxiv:1707.07397Comment: ICML 2018.Notary: a device for secure transaction approval., , , , and . SOSP, page 97-113. ACM, (2019)Notary: A Device for Secure Transaction Approval., , , , and . GetMobile Mob. Comput. Commun., 24 (2): 34-38 (2020)Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks., , and . NeurIPS Datasets and Benchmarks, (2021)Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples., , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 274-283. PMLR, (2018)Synthesizing Robust Adversarial Examples., , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 284-293. PMLR, (2018)The K2 Architecture for Trustworthy Hardware Security Modules., , , and . KISV@SOSP, page 26-32. ACM, (2023)Black-box Adversarial Attacks with Limited Queries and Information., , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 2142-2151. PMLR, (2018)Verifying Hardware Security Modules with Information-Preserving Refinement., , and . OSDI, page 503-519. USENIX Association, (2022)