publication venue for Breaking Cuckoo Hash: Black Box Attacks 2021 A hardware-software approach for on-line soft error mitigation in interrupt-driven applications. 13:502-508. 2016 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. 12:312-325. 2015 Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures. 8:308-314. 2011