关注
Rodothea Myrsini Tsoupidi
Rodothea Myrsini Tsoupidi
Researcher
在 acm.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Thwarting code-reuse and side-channel attacks in embedded systems
RM Tsoupidi, E Troubitsyna, P Papadimitratos
Computers & Security 133, 103405, 2023
72023
Vivienne: Relational verification of cryptographic implementations in webassembly
RM Tsoupidi, M Balliu, B Baudry
2021 IEEE Secure Development Conference (SecDev), 94-102, 2021
72021
Constraint-based software diversification for efficient mitigation of code-reuse attacks
RM Tsoupidi, R Castañeda Lozano, B Baudry
International Conference on Principles and Practice of Constraint …, 2020
72020
Securing Optimized Code Against Power Side Channels
RM Tsoupidi, RC Lozano, E Troubitsyna, P Papadimitratos
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 340-355, 2023
62023
Constraint-based diversification of jop gadgets
RM Tsoupidi, RC Lozano, B Baudry
Journal of Artificial Intelligence Research 72, 1471-1505, 2021
62021
Two-phase WCET analysis for cache-based symmetric multiprocessor systems
RM Tsoupidi
22017
TarMiner: Automatic extraction of miRNA targets from literature
RM Tsoupidi, I Kanellos, T Vergoulis, IS Vlachos, AG Hatzigeorgiou, ...
Proceedings of the 27th International Conference on Scientific and …, 2015
22015
Generating Optimized and Secure Binary Code
RM Tsoupidi
KTH Royal Institute of Technology, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–8