From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework., , , , , , , , и . CF, стр. 392-397. ACM, (2019)Promoting the Acquisition of Hardware Reverse Engineering Skills., , , , и . CoRR, (2021)An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes., , , , и . SOUPS @ USENIX Security Symposium, стр. 285-300. USENIX Association, (2020)An Exploratory Study of Hardware Reverse Engineering Technical and Cognitive Processes., , , , и . CoRR, (2021)On the Design and Misuse of Microcoded (Embedded) Processors - A Cautionary Note., , , , , и . USENIX Security Symposium, стр. 267-284. USENIX Association, (2021)DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering., , , , и . IACR Cryptol. ePrint Arch., (2020)LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security., , , , , , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 412-446 (2021)Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights., , , , , , и . TALE, стр. 438-445. IEEE, (2018)Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights., , , , , , , и . ASP-DAC, стр. 104-111. ACM, (2019)Promoting the Acquisition of Hardware Reverse Engineering Skills., , , , и . FIE, стр. 1-9. IEEE, (2019)