Author of the publication

Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.

, , , , and . ACSAC, page 425-436. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework., , , , , and . CoRR, (2019)Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , and . CoRR, (2018)Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors., , , , and . ACSAC, page 425-436. ACM, (2017)Virtualization Based Password Protection against Malware in Untrusted Operating Systems., and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 201-218. Springer, (2012)Guardian: Hypervisor as Security Foothold for Personal Computers., and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 19-36. Springer, (2013)SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection., , , , , , and . CoRR, (2019)ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks., , , , and . NDSS, The Internet Society, (2014)DriverGuard: A Fine-Grained Protection on I/O Flows., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 227-244. Springer, (2011)SvTPM: A Secure and Efficient vTPM in the Cloud., , , , , , , and . CoRR, (2019)SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 193-211. Springer, (2015)