Reinhard Berlach

According to our database1, Reinhard Berlach authored at least 7 papers between 2012 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
SAHARA: a security-aware hazard and risk analysis method.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

Memory-efficient on-card byte code verification for Java cards.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

A Fault Attack Emulation Environment to Evaluate Java Card Virtual-Machine Security.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

2013
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection.
Proceedings of the Smart Card Research and Advanced Applications, 2012


  Loading...