Adam Waksman

According to our database1, Adam Waksman authored at least 12 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Modelling Urban Dynamics with Multi-Modal Graph Convolutional Networks.
CoRR, 2021

Modelling Cooperation and Competition in Urban Retail Ecosystems with Complex Network Metrics.
CoRR, 2021

2015
Trustworthy hardware from untrusted components.
Commun. ACM, 2015

2014
Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources.
PhD thesis, 2014

A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

2013
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security.
IEEE Micro, 2013

Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property.
IEEE Des. Test, 2013

On the feasibility of online malware detection with performance counters.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013

FANCI: identification of stealthy malicious logic using boolean functional analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Side-channel vulnerability factor: A metric for measuring information leakage.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

2011
Silencing Hardware Backdoors.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Tamper Evident Microprocessors.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010


  Loading...