Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking BLE Beacons For Fun But Mostly Profit., , , and . EUROSEC, page 4:1-4:6. ACM, (2017)Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery., , , , , , and . CCS, page 341-355. ACM, (2023)Efficient and DoS-resistant Consensus for Permissioned Blockchains., , , , , , , , , and 3 other author(s). Perform. Evaluation, (2022)Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research., , , , , and . HASP@MICRO, page 5:1-5:8. ACM, (2021)Speedster: An Efficient Multi-party State Channel via Enclaves., , , and . AsiaCCS, page 637-651. ACM, (2022)Class-Chord: Efficient Messages to Classes of Nodes in Chord., , , , and . CSCloud, page 165-174. IEEE Computer Society, (2015)Nighthawk: Transparent System Introspection from Ring -3., , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 217-238. Springer, (2019)Temporal metrics for software vulnerabilities., , and . CSIIRW, page 44:1-44:3. ACM, (2008)Happer: Unpacking Android Apps via a Hardware-Assisted Approach., , , , , , , and . SP, page 1641-1658. IEEE, (2021)Smile: Secure Memory Introspection for Live Enclave., , and . SP, page 386-401. IEEE, (2022)