Author of the publication

Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components.

, , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT., and . NEWCAS, page 1-4. IEEE, (2019)Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks., and . ADHOCNETS, volume 155 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 225-236. Springer, (2015)τ C: C with Process Network Extensions for Embedded Manycores., , and . ICCS, volume 29 of Procedia Computer Science, page 1100-1112. Elsevier, (2014)Exploration of Fault Effects on Formal RISC-V Microarchitecture Models., , , , and . FDTC, page 73-83. IEEE, (2022)Software acceleration of floating-point multiplication using runtime code generation - Student paper., and . ICEAC, page 18-23. IEEE, (2013)Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults., , , , , , , , and . IACR Cryptol. ePrint Arch., (2024)μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections., , , , and . FMCAD, page 101-109. IEEE, (2023)COGITO: Code Polymorphism to Secure Devices., , , , , , and . SECRYPT, page 451-456. SciTePress, (2014)All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems., , , , , , , , and . CS2@HiPEAC, page 17-18. ACM, (2018)SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks., , and . DATE, page 556-559. IEEE, (2022)