Personensuche
X
?
2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) ,
2
From Characters to Chaos: On the Feasibility of Attacking T..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
3
$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
4
ASAP : reconciling asynchronous real-time operations and..:
, In:
?
2022 6th International Conference on Information Technology (InCIT) ,
5
The SWC-based Security Analysis Tool for Smart Contract Vul..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
7
On the TOCTOU Problem in Remote Attestation:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
8
Towards Automated Augmentation and Instrumentation of Legac..:
, In:
?
2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) ,
9
Towards Systematic Design of Collective Remote Attestation ..:
, In:
?
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) ,
10
PURE: Using Verified Remote Attestation to Obtain Proofs of..:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
12
Temporal Consistency of Integrity-Ensuring Computations and..:
, In:
?
Proceedings of the 55th Annual Design Automation Conference ,
14