Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing., and . EVT/WOTE, USENIX Association, (2009)Defeating UCI: Building Stealthy and Malicious Hardware., , , and . IEEE Symposium on Security and Privacy, page 64-77. IEEE Computer Society, (2011)Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices., , and . SOUPS, page 89-102. USENIX Association, (2015)Server-side verification of client behavior in cryptographic protocols., , , , and . CoRR, (2016)Automated Analysis of Election Audit Logs., , , , , , and . EVT/WOTE, USENIX Association, (2012)Symbolic software model validation., , , , , , , , and . MEMOCODE, page 97-108. IEEE, (2013)FinalFilter: Asserting Security Properties of a Processor at Runtime., , , and . IEEE Micro, 39 (4): 35-42 (2019)Verification with small and short worlds., , , , and . FMCAD, page 68-77. IEEE, (2012)Model checking to find vulnerabilities in an instruction set architecture., and . HOST, page 109-113. IEEE Computer Society, (2016)End-to-End Automated Exploit Generation for Validating the Security of Processor Designs., , , and . MICRO, page 815-827. IEEE Computer Society, (2018)