Ravishankar K. Iyer [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots RAID2019-2019 - Beijing, China
SELF-VERIFYING AUTHENTICATION – A FRAMEWORK FOR SAFER INTEGRATIONS OF SINGLE-SIGN-ON SERVICES blackhateu-2017 - london,uk
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring WOOT-2015 - washington,USA