Author:
Davi Lucas Vincenzo,Dmitrienko Alexandra,Nürnberger Stefan,Sadeghi Ahmad-Reza
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems;ACM Computing Surveys;2024-04-26
2. Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion;2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP);2023-07
3. Breaking Embedded Software Homogeneity with Protocol Mutations;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023
4. Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation;Proceedings of the 38th Annual Computer Security Applications Conference;2022-12-05
5. Randezvous: Making Randomization Effective on MCUs;Proceedings of the 38th Annual Computer Security Applications Conference;2022-12-05