Author of the publication

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks., , and . EuroS&P, page 671-686. IEEE, (2023)Hardware Security Evaluation Using Assurance Case Models., , , and . ARES, page 193-198. IEEE Computer Society, (2015)T-DRE: a hardware trusted computing base for direct recording electronic vote machines., , , , , and . ACSAC, page 191-198. ACM, (2010)On Device Identity Establishment and Verification., , and . EuroPKI, volume 6391 of Lecture Notes in Computer Science, page 130-145. Springer, (2009)FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems., , and . NSS, page 184-191. IEEE, (2011)Case Study: On the Security of Key Storage on PCs., , and . TrustCom/ISPA/IUCC, page 1645-1651. IEEE Computer Society, (2013)Security and system architecture: comparison of Android customizations., , , , , , , and . WISEC, page 12:1-12:6. ACM, (2015)A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)ACBuilder: A tool for hardware architecture security evaluation., , , , and . HOST, page 97-102. IEEE Computer Society, (2016)