Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Daniel Vietz University of Stuttgart

Execution Patterns for Quantum Applications, , , , , , , and . Proceedings of the 18th International Conference on Software Technologies, page 258-268. Setúbal, SciTePress, (2023)

Daniel Georg University of Stuttgart

Execution Patterns for Quantum Applications, , , , , , , and . Proceedings of the 18th International Conference on Software Technologies, page 258-268. Setúbal, SciTePress, (2023)

Dr. Daniel Hernandez University of Stuttgart

Predicate-Conditional Conformalized Answer Sets for Knowledge Graph Embeddings, , , , , , and . Findings of the Association for Computational Linguistics, ACL 2025, page 4145--4167. Association for Computational Linguistics, (July 2025)

Daniel Lehmann University of Stuttgart

That’s a Tough Call : Studying the Challenges of Call Graph Construction for WebAssembly, , , and . ISSTA 2023 : Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, page 892-903. New York, Association for Computing Machinery, (2023)
 

Other publications of authors with the same name

Software-based Microarchitectural Attacks.. CoRR, (2017)Meltdown: Reading Kernel Memory from User Space., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 973-990. USENIX Association, (2018)JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits., , and . NDSS, The Internet Society, (2019)Practical Memory Deduplication Attacks in Sandboxed Javascript., , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 108-122. Springer, (2015)Wait a second: playing Hanabi without giving hints., and . FDG, page 14:1-14:7. ACM, (2019)Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR., , , , and . ACM Conference on Computer and Communications Security, page 368-379. ACM, (2016)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , and 2 other author(s). CCS, page 769-784. ACM, (2019)KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks., , , , , , and . NDSS, The Internet Society, (2018)NetSpectre: Read Arbitrary Memory over Network., , , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 279-299. Springer, (2019)KASLR is Dead: Long Live KASLR., , , , , and . ESSoS, volume 10379 of Lecture Notes in Computer Science, page 161-176. Springer, (2017)