Author of the publication

Formal verification of information flow security for a simple arm-based separation kernel.

, , , , and . ACM Conference on Computer and Communications Security, page 223-234. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual machine based security architecture., , , and . WorldCIS, page 210-215. IEEE, (2011)Trustworthy Memory Isolation of Linux on Embedded Devices., , , , and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 125-142. Springer, (2015)Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels., , , and . POST, volume 10804 of Lecture Notes in Computer Science, page 109-133. Springer, (2018)Trustworthy Prevention of Code Injection in Linux on Embedded Devices., , , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 90-107. Springer, (2015)ConfLLVM: A Compiler for Enforcing Data Confidentiality in Low-Level Code., , , , , , , , and . EuroSys, page 4:1-4:15. ACM, (2019)Trustworthy Virtualization of the ARMv7 Memory Subsystem., , and . SOFSEM, volume 8939 of Lecture Notes in Computer Science, page 578-589. Springer, (2015)Formal verification of information flow security for a simple arm-based separation kernel., , , , and . ACM Conference on Computer and Communications Security, page 223-234. ACM, (2013)TCvisor: A hypervisor level secure storage., , , and . ICITST, page 1-9. IEEE, (2010)Machine code verification of a tiny ARM hypervisor., , and . TrustED@CCS, page 3-12. ACM, (2013)Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures., , , and . IEEE Symposium on Security and Privacy, page 38-55. IEEE Computer Society, (2016)