From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds., , , и . NDSS, The Internet Society, (2018)LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells., , , и . HOST, стр. 305-315. IEEE, (2020)HeisenTrojans: They Are Not There Until They Are Triggered., , , , и . AsianHOST, стр. 1-7. IEEE, (2023)When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit., , и . AsianHOST, стр. 1-6. IEEE, (2023)Device attestation: Past, present, and future., , , и . DATE, стр. 473-478. IEEE, (2018)Inter-IP Malicious Modification Detection through Static Information Flow Tracking., , , , и . DATE, стр. 600-603. IEEE, (2022)Hardware control flow integrity., , , , и . The Continuing Arms Race, ACM / Morgan & Claypool, (2018)Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms., , , , , , и . ACM Great Lakes Symposium on VLSI, стр. 481-486. ACM, (2022)Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform., , , , , и . ICCD, стр. 149-152. IEEE Computer Society, (2016)FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor., , , , , и . IEEE Trans. Inf. Forensics Secur., (2022)