From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks., , , , , и . RAID, стр. 220-234. ACM, (2021)RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64., , , , , , , и . RAID, стр. 30-42. ACM, (2022)In Hardware We Trust: Gains and Pains of Hardware-assisted Security., , , , и . DAC, стр. 44. ACM, (2019)POSE: Practical Off-chain Smart Contract Execution., , , , , , и . NDSS, The Internet Society, (2023)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , и . USENIX Security Symposium, стр. 801-818. USENIX Association, (2019)SafeTEE: Combining Safety and Security on ARM-based Microcontrollers., , , , и . DATE, стр. 520-525. IEEE, (2022)Beyond Mitigations: Advancing Attack Surface Reduction and Analysis.. Technical University of Darmstadt, Germany, (2024)CURE: A Security Architecture with CUstomizable and Resilient Enclaves., , , , , , и . USENIX Security Symposium, стр. 1073-1090. USENIX Association, (2021)V'CER: Efficient Certificate Validation in Constrained Networks., , , и . USENIX Security Symposium, стр. 4491-4508. USENIX Association, (2022)DARWIN: Survival of the Fittest Fuzzing Mutators., , , , и . NDSS, The Internet Society, (2023)