Get my own profile
Public access
View all36 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Cristiano GiuffridaAssociate Professor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
Ben GrasIntel CorporationVerified email at intel.com
Pietro FrigoQualcomm Technologies Inc.Verified email at qti.qualcomm.com
S.J.R. van SchaikUniversity of MichiganVerified email at synkhronix.com
Alyssa MilburnIntel STORMVerified email at intel.com
Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
Onur MutluETH Zürich and Carnegie Mellon UniversityVerified email at inf.ethz.ch
Patrick JattkeETH Zurich, SwitzerlandVerified email at ethz.ch
Hasan HassanETH ZurichVerified email at inf.ethz.ch
Sebastian ÖsterlundOffensive Security Researcher, IntelVerified email at intel.com
Erik BosmanVrije Universiteit, AmsterdamVerified email at few.vu.nl
Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
Giorgi MaisuradzeCISPA, Helmholtz Center for Information SecurityVerified email at cispa.saarland
Thilo KielmannAssociate Professor of Computer Science, Vrije Universiteit, AmsterdamVerified email at vu.nl
Andrei TatarPhD candidate, Vrije Universiteit AmsterdamVerified email at vu.nl
Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
Radhesh Krishnan KonothQualcomm Product SecurityVerified email at qti.qualcomm.com
Flavien SoltPhD student, Computer Security, ETH ZürichVerified email at ethz.ch
Clémentine MauriceCNRSVerified email at cnrs.fr