Author:
Snow K. Z.,Monrose F.,Davi L.,Dmitrienko A.,Liebchen C.,Sadeghi A.
Cited by
335 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. NIRVANA: Non-Invasive Real-Time VulnerAbility ANAlysis for RISC-V Processor;2024 IEEE International Conference on Omni-layer Intelligent Systems (COINS);2024-07-29
2. Towards Anomaly Detection in Embedded Systems Application Using LLVM Passes;2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC);2024-07-02
3. Understanding the Security Landscape of Control-Data and Non-Control-Data Attacks Against IoT Systems;2024 9th International Conference on Smart and Sustainable Technologies (SpliTech);2024-06-25
4. PoE: A Domain-Specific Language for Exploitation;2024 Silicon Valley Cybersecurity Conference (SVCC);2024-06-17
5. Randomize the Running Function When It Is Disclosed;IEEE Transactions on Computers;2024-06