Get my own profile
Co-authors
- Luca CompagnaSAP Security ResearchVerified email at sap.com
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Slim TRABELSISAP, EurecomVerified email at sap.com
- Michele BezziSAP Security ResearchVerified email at sap.com
- Anderson Santana de OliveiraSAP Security ResearchVerified email at sap.com
- Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
- Gomez LaurentSAP Security ResearchVerified email at sap.com
- Volkmar LotzSAP Security ResearchVerified email at sap.com
- Martin HärterichResearch Expert, SAP Security ResearchVerified email at sap.com
- Daniel BernauSAP Security ResearchVerified email at sap.com
- Anselme TuenoSAP Security ResearchVerified email at sap.com
- Cedric HebertSAP Security ResearchVerified email at sap.com
- Jonas BöhlerSAP Security ResearchVerified email at sap.com
- Marco RosaSAP Security ResearchVerified email at sap.com
- Benjamin WeggenmannResearcher, SAP Security ResearchVerified email at sap.com
- Merve SahinSAP Security ResearchVerified email at eurecom.fr
- Piergiorgio LadisaSAP Security Research, Université de Rennes 1, Inria, IRISAVerified email at sap.com
- Sofiane LouniciEURECOMVerified email at eurecom.fr
- Tom BarberResearcher, SAP Security ResearchVerified email at sap.com