Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 22 (1): 343-358 (January 2025)Pretend synchrony: synchronous verification of asynchronous distributed programs., , , , and . Proc. ACM Program. Lang., 3 (POPL): 59:1-59:30 (2019)PLAS: The 18th Workshop on Programming Languages and Analysis for Security., and . CCS, page 3659. ACM, (2023)IODINE: Verifying Constant-Time Execution of Hardware., , , and . USENIX Security Symposium, page 1411-1428. USENIX Association, (2019)Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts., , , , and . CCS, page 2128-2142. ACM, (2023)Cardinalities in Software Verification.. Technical University Munich, Germany, (2016)Triereme: Speeding up hybrid fuzzing through efficient query scheduling., , , , , and . ACSAC, page 56-70. ACM, (2023)Solver-Aided Constant-Time Hardware Verification., , , and . CCS, page 429-444. ACM, (2021)Refinement Type Refutations., , and . Proc. ACM Program. Lang., 8 (OOPSLA2): 962-987 (2024)Constant-time foundations for the new spectre era., , , , , , and . PLDI, page 913-926. ACM, (2020)