Mahesh v. Tripunitara [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way) WOOT-2016 - austin,usa
An Attack and a Defense in the Context the Security of Digital ICs BSidesToronto-2015 - Toronto,Canada
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks codapspy-2015 - San Antonio,USA
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes NDSS-2015 - san diego,usa
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid CCS-2014 - Scottsdale,USA
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation USENIXatc-2014 - Philadelphia,USA
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation USENIX-2013 - Washington, D.C.
Relating Declarative Semantics and Usability in Access Control Symposium On Usable Privacy and Security-2012 - Washington
Relating Declarative Semantics and Usability in Access Control SOUPS-2012 - Washington,USA
Automatic Error Finding in Access-Control Policies Confrence-on-computer-communications-security-2011 - Chicago, USA