Author of the publication

Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform.

, , , , , and . ICCD, page 149-152. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells., , , and . HOST, page 305-315. IEEE, (2020)HeisenTrojans: They Are Not There Until They Are Triggered., , , , and . AsianHOST, page 1-7. IEEE, (2023)When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit., , and . AsianHOST, page 1-6. IEEE, (2023)Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds., , , and . NDSS, The Internet Society, (2018)Device attestation: Past, present, and future., , , and . DATE, page 473-478. IEEE, (2018)Hardware control flow integrity., , , , and . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms., , , , , , and . ACM Great Lakes Symposium on VLSI, page 481-486. ACM, (2022)Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform., , , , , and . ICCD, page 149-152. IEEE Computer Society, (2016)Inter-IP Malicious Modification Detection through Static Information Flow Tracking., , , , and . DATE, page 600-603. IEEE, (2022)