Thwarting code-reuse and side-channel attacks in embedded systems RM Tsoupidi, E Troubitsyna, P Papadimitratos Computers & Security 133, 103405, 2023 | 7 | 2023 |
Vivienne: Relational verification of cryptographic implementations in webassembly RM Tsoupidi, M Balliu, B Baudry 2021 IEEE Secure Development Conference (SecDev), 94-102, 2021 | 7 | 2021 |
Constraint-based software diversification for efficient mitigation of code-reuse attacks RM Tsoupidi, R Castañeda Lozano, B Baudry International Conference on Principles and Practice of Constraint …, 2020 | 7 | 2020 |
Securing Optimized Code Against Power Side Channels RM Tsoupidi, RC Lozano, E Troubitsyna, P Papadimitratos 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 340-355, 2023 | 6 | 2023 |
Constraint-based diversification of jop gadgets RM Tsoupidi, RC Lozano, B Baudry Journal of Artificial Intelligence Research 72, 1471-1505, 2021 | 6 | 2021 |
Two-phase WCET analysis for cache-based symmetric multiprocessor systems RM Tsoupidi | 2 | 2017 |
TarMiner: Automatic extraction of miRNA targets from literature RM Tsoupidi, I Kanellos, T Vergoulis, IS Vlachos, AG Hatzigeorgiou, ... Proceedings of the 27th International Conference on Scientific and …, 2015 | 2 | 2015 |
Generating Optimized and Secure Binary Code RM Tsoupidi KTH Royal Institute of Technology, 2023 | | 2023 |