Personensuche
X
?
2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) ,
1
From Characters to Chaos: On the Feasibility of Attacking T..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
2
$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
3
ASAP : reconciling asynchronous real-time operations and..:
, In:
?
2022 6th International Conference on Information Technology (InCIT) ,
4
The SWC-based Security Analysis Tool for Smart Contract Vul..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
5
On the TOCTOU Problem in Remote Attestation:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
6
Towards Automated Augmentation and Instrumentation of Legac..:
, In:
?
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) ,
7
Towards Systematic Design of Collective Remote Attestation ..:
, In:
?
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) ,
8
PURE: Using Verified Remote Attestation to Obtain Proofs of..:
, In:
?
Proceedings of the 55th Annual Design Automation Conference ,
9
Reconciling remote attestation and safety-critical operatio..:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
10
Temporal Consistency of Integrity-Ensuring Computations and..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
11
Lightweight Swarm Attestation : A Tale of Two LISA-s:
, In:
?
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
12