Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sharad MalikProfessor of Electrical and Computer Engineering, Princeton UniversityVerified email at princeton.edu
Sanjit A. SeshiaUniversity of California, BerkeleyVerified email at eecs.berkeley.edu
Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
Erik LarssonLunds UniversitetVerified email at eit.lth.se
Virendra SinghAssociate Professor of Electrical Engineering, Indian Institute of Technology BombayVerified email at ee.iitb.ac.in
Nestan TsiskaridzeResearch Engineer at Stanford UniversityVerified email at stanford.edu
Ashish TiwariComputer Scientist, SRI InternationalVerified email at csl.sri.com
Adrią GascónGoogle ResearchVerified email at google.com
Kewal SalujaProfessor of Electrical and Computer Engineering, University of Wisconsin - MadisonVerified email at ece.wisc.edu
Yakir VizelTechnionVerified email at cs.technion.ac.il
Natarajan ShankarSRI International Computer Science LaboratoryVerified email at csl.sri.com
Wenchao LiAssistant Professor, Boston UniversityVerified email at bu.edu
Aarti GuptaPrinceton UniversityVerified email at cs.princeton.edu
Rohit SinhaSwirlds, Inc.Verified email at berkeley.edu
Sujit Kumar MuduliPhD Student, IIT KanpurVerified email at cse.iitk.ac.in
Ilia Lebedevgradient.tech, MITVerified email at gradient.tech
Dillon ReismanVerified email at nyu.edu
Jason M FungOffensive Security Research Manager, Intel CorporationVerified email at intel.com
Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAVerified email at vt.edu
Cameron RasmussenUC BerkeleyVerified email at berkeley.edu