Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Kaveh RazaviAssistant Professor at ETH ZurichVerified email at ethz.ch
Cristiano GiuffridaAssociate Professor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyVerified email at veelasha.org
Elias AthanasopoulosAssociate Professor, University of CyprusVerified email at ucy.ac.cy
Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
D. AndriesseSecurity Researcher at IntelVerified email at few.vu.nl
Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Tim BlazytkoPhD student at Ruhr-Universitaet BochumVerified email at rub.de
Enes GöktaşSecurity Researcher, AppleVerified email at apple.com