20112020

Research activity per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Education/Academic qualification

Master of Philosophy, Politecnico di Torino

Award Date: 20 Sep 2011

Fingerprint

Dive into the research topics where Nicola Tuveri is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Certified Side Channels

    Pereida García, C., Hassan, S. U., Tuveri, N., Gridin, I., Cabrera Aldaya, A. & Brumley, B. B., 2020, 29th USENIX Security Symposium, USENIX Security 2020. p. 2021-2038 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Batch Binary Weierstrass

    Brumley, B. B., Hassan, S. U., Shaindlin, A., Tuveri, N. & Vuojärvi, K., 2 Oct 2019, Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings. Schwabe, P. & Thériault, N. (eds.). Springer Verlag, p. 364-384 21 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Port Contention for Fun and Profit

    Cabrera Aldaya, A., Brumley, B. B., ul Hassan, S., Pereida García, C. & Tuveri, N., 20 May 2019, 2019 IEEE Symposium on Security and Privacy (SP) (2019). San Francisco, CA, US: IEEE, p. 1037-1054 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    22 Citations (Scopus)
  • Start your ENGINEs: Dynamically Loadable Contemporary Crypto

    Tuveri, N. & Brumley, B., Sep 2019, 2019 IEEE Cybersecurity Development (SecDev).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    23 Downloads (Pure)
  • Triggerflow: Regression Testing by Advanced Execution Path Inspection

    Gridin, I., Pereida García, C., Tuveri, N. & Brumley, B. B., 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Springer Verlag, p. 330-350 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    4 Citations (Scopus)