Author of the publication

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.

, , , , , and . USENIX Security Symposium, page 895-912. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method of Human Skin Region Detection Based on PCNN., , , and . ISNN (3), volume 5553 of Lecture Notes in Computer Science, page 486-493. Springer, (2009)Automatically deriving pointer reference expressions from binary code for memory dump analysis., , and . ESEC/SIGSOFT FSE, page 614-624. ACM, (2015)A CMOS image sensor for focal plane decomposition., , , , and . ISCAS (5), page 5322-5325. IEEE, (2005)Preventing Cryptographic Key Leakage in Cloud Virtual Machines., , , and . USENIX Security Symposium, page 703-718. USENIX Association, (2014)Automatic Uncovering of Tap Points from Kernel Executions., , and . RAID, volume 9854 of Lecture Notes in Computer Science, page 49-70. Springer, (2016)Characterizing kernel malware behavior with kernel data access patterns., , and . AsiaCCS, page 207-216. ACM, (2011)An Empirical Study on Ethereum Private Transactions and the Security Implications., , , , , and . CoRR, (2022)On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode., , , , , and . CoRR, (2019)A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses., , and . Secur. Commun. Networks, (2022)On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution., , , and . IEEE Trans. Dependable Secur. Comput., 12 (5): 557-570 (2015)