1. New Results on Instruction Cache Attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010;Aciicmez Onur;Springer Verlag LNCS,2010
2. Side channel attacks in embedded systems: A tale of hostilities and deterrence
3. Proteus
4. Kishore Angrishi. 2017. Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. CoRR abs/1702.03681 (2017). arXiv:1702.03681 http://arxiv.org/abs/1702.03681 Kishore Angrishi. 2017. Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. CoRR abs/1702.03681 (2017). arXiv:1702.03681 http://arxiv.org/abs/1702.03681
5. Implementing Cryptographic Program Obfuscation;Apon Daniel;IACR Cryptology ePrint Archive,2014