Get my own profile
Co-authors
Daniel GenkinUniversity of MichiganVerified email at umich.edu
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Gernot HeiserProfessor of Computer Science, UNSW Sydney, and Data61, CSIROVerified email at unsw.edu.au
Qian GeGoogleVerified email at google.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Marina MinkinUniversity of MichiganVerified email at umich.edu
Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Fangfei LiuIntel CorporationVerified email at intel.com
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Joop van de PolUnaffiliatedVerified email at my.bristol.ac.uk
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Raoul StrackxFortanixVerified email at fortanix.com
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
Baris KasikciUniversity of MichiganVerified email at umich.edu
Yuval Yarom
Verified email at cs.adelaide.edu.au - Homepage