Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anil KurmusIBM Research Europe - ZurichVerified email at zurich.ibm.com
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
Paolo Milani ComparettiPostdoc at International Secure Systems LabVerified email at seclab.tuwien.ac.at
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Istvan HallerVU AmsterdamVerified email at student.vu.nl
Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
Lukas WeichselbaumGoogle, iseclabVerified email at weichselbaum.biz
Alexandra SandulescuVerified email at google.com
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
Andrea MambrettiIBM Research Europe - ZurichVerified email at zurich.ibm.com
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Collin MullinerMUlliNER.ORGVerified email at mulliner.org