Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Run-DMA., and . WOOT, USENIX Association, (2015)The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion., , , and . USENIX Security Symposium, USENIX Association, (2011)On the Practical Exploitability of Dual EC in TLS Implementations., , , , , , , , , and . USENIX Security Symposium, page 319-335. USENIX Association, (2014)Triton: A Software-Reconfigurable Federated Avionics Testbed., , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web., , , , and . USENIX Security Symposium, page 1475-1492. USENIX Association, (2018)Comprehensive Experimental Analyses of Automotive Attack Surfaces., , , , , , , , , and . USENIX Security Symposium, USENIX Association, (2011)iSeeYou: Disabling the MacBook Webcam Indicator LED., and . USENIX Security Symposium, page 337-352. USENIX Association, (2014)Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM., , , , , , and . USENIX Security Symposium, page 941-955. USENIX Association, (2014)A Systematic Analysis of the Juniper Dual EC Incident., , , , , , , , and . IACR Cryptology ePrint Archive, (2016)A Systematic Analysis of the Juniper Dual EC Incident., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 468-479. ACM, (2016)