Amir Sadeghi

Affiliations: 
Biomedical Engineering The University of Texas Health Science Center at San Antonio, San Antonio, TX, United States 
Area:
Radiology, Radiation Physics, Oncology
Google:
"Amir Sadeghi"
Cross-listing: MPROTree

BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Zeitouni S, Oren Y, Wachsmann C, et al. (2016) Remanence Decay Side-Channel: The PUF Case Ieee Transactions On Information Forensics and Security. 11: 1106-1116
McLaughlin S, Konstantinou C, Wang X, et al. (2016) The Cybersecurity Landscape in Industrial Control Systems Proceedings of the Ieee. 104: 1039-1057
Crane S, Volckaert S, Schuster F, et al. (2015) It's a TRaP: Table randomization and protection against function-reuse attacks Proceedings of the Acm Conference On Computer and Communications Security. 2015: 243-255
Nagy M, Bui T, De Cristofaro E, et al. (2015) How far removed are you? Scalable privacy-preserving estimation of social path length with Social PaL Proceedings of the 8th Acm Conference On Security and Privacy in Wireless and Mobile Networks, Wisec 2015
Brasser F, El Mahjoub B, Sadeghi AR, et al. (2015) TyTAN: Tiny trust anchor for tiny devices Proceedings - Design Automation Conference. 2015
Davi L, Hanreich M, Paul D, et al. (2015) HAFIX: Hardware-Assisted Flow Integrity eXtension Proceedings - Design Automation Conference. 2015
Sadeghi AR, Davi L, Larsen P. (2015) Securing legacy software against real-world code-reuse exploits: Utopia, alchemy, or possible future? Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 55-61
Bucicoiu M, Davi L, Deaconescu R, et al. (2015) XiOS: Extended application sandboxing on iOS Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 43-54
Karri R, Koushanfar F, Sinanoglu O, et al. (2015) Guest editorial special section on hardware security and trust Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 873-874
Crane S, Liebchen C, Homescu A, et al. (2015) Readactor: Practical code randomization resilient to memory disclosure Proceedings - Ieee Symposium On Security and Privacy. 2015: 763-780
See more...