Cited By
View all- Schulze MLindenmeier CRöckl JFreiling FSchrittwieser SIanni M(2024)IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZoneProceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks10.1145/3689934.3690838(11-21)Online publication date: 19-Nov-2024
- Langehaug TGraham S(2024)CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and ClassificationDigital Threats: Research and Practice10.1145/36528615:3(1-22)Online publication date: 28-Mar-2024
- Alvarenga EBrands JDoliwa Pden Hartog JKraft EMedwed MNikov VRenes JRosso MSchneider TVeshchikov N(2024)Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack ClassificationsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2022.323169212:2(583-600)Online publication date: Apr-2024
- Show More Cited By