Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GenkinUniversity of MichiganVerified email at umich.edu
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Gernot HeiserProfessor of Computer Science, UNSW Sydney, and Data61, CSIROVerified email at unsw.edu.au
Qian GeGoogleVerified email at google.com
Marina MinkinUniversity of MichiganVerified email at umich.edu
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Fangfei LiuIntel CorporationVerified email at intel.com
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Joop van de PolUnaffiliatedVerified email at my.bristol.ac.uk
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Raoul StrackxFortanixVerified email at fortanix.com
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
Baris KasikciUniversity of MichiganVerified email at umich.edu
Yuval Yarom
Verified email at cs.adelaide.edu.au - Homepage