Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Cristiano GiuffridaProfessor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Asia SlowinskaVU University AmsterdamVerified email at vusec.net
Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Kaveh RazaviETH ZurichVerified email at ethz.ch
Ben GrasIntel CorporationVerified email at intel.com
Erik van der KouweVUSec, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Brett Stone-GrossUniversity of California, Santa BarbaraVerified email at cs.ucsb.eduDaniel PlohmannFraunhofer FKIEVerified email at fkie.fraunhofer.de
Gernot HeiserProfessor of Computer Science, University of New South WalesVerified email at unsw.edu.au
Enes GöktaşSecurity Researcher, AppleVerified email at apple.comChristian J. DietrichWestphalian UniversityVerified email at cj2s.de
Radhesh Krishnan KonothQualcomm Product SecurityVerified email at qti.qualcomm.com
Manolis StamatogiannakisVrije Universiteit AmsterdamVerified email at vu.nl
Sanjay RawatPrincipal Security Researcher, Technology Innovation Institute (TII)Verified email at bristol.ac.uk
Roland GrozUniv. Grenoble AlpesVerified email at imag.frThorsten HolzMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Andre PawlowskiChair for Systems Security, Ruhr-University BochumVerified email at rub.de