Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Secure User Mode Device Execution with DMA., and . Haifa Verification Conference, volume 8855 of Lecture Notes in Computer Science, page 236-251. Springer, (2014)Anti-Adhesive Surfaces Inspired by Bee Mandible Surfaces, , , , , , and . Biomimetics, 8 (8): 579 (2023)Securing DMA through virtualization., and . COMPENG, page 1-6. IEEE, (2012)Machine Assisted Proof of ARMv7 Instruction Level Isolation Properties., , and . CPP, volume 8307 of Lecture Notes in Computer Science, page 276-291. Springer, (2013)On the verification of system-level information flow properties for virtualized execution platforms., , and . J. Cryptographic Engineering, 9 (3): 243-261 (2019)A high assurance virtualization platform for ARMv8., , , , and . EuCNC, page 210-214. IEEE, (2016)High Assurance Security Products on COTS Platforms., and . ERCIM News, (2015)Automatic Derivation of Platform Noninterference Properties., and . SEFM, volume 9763 of Lecture Notes in Computer Science, page 27-44. Springer, (2016)An update algorithm for Fourier coefficients., , and . EUSIPCO, page 1509-1512. IEEE, (2004)Affordable Separation on Embedded Platforms - Soft Reboot Enabled Virtualization on a Dual Mode System., , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 37-54. Springer, (2014)