Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Anil KurmusIBM Research Europe - ZurichVerified email at zurich.ibm.com
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Martina LindorferAssociate Professor at TU WienVerified email at tuwien.ac.at
- Paolo Milani ComparettiPostdoc at International Secure Systems LabVerified email at seclab.tuwien.ac.at
- Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
- Istvan HallerVU AmsterdamVerified email at student.vu.nl
- Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
- Victor van der VeenQualcomm Product SecurityVerified email at qualcomm.com
- Lukas WeichselbaumGoogle, iseclabVerified email at weichselbaum.biz
- Alexandra SandulescuVerified email at google.com
- Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
- Andrea MambrettiIBM Research Europe - ZurichVerified email at zurich.ibm.com
- Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
- William RobertsonAssociate Professor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
- Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
- Collin MullinerMUlliNER.ORGVerified email at mulliner.org