Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Port Contention Goes Portable: Port Contention Side Channels in Web Browsers., , , and . AsiaCCS, page 1182-1194. ACM, (2022)Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors., , , , , and . AsiaCCS, page 813-825. ACM, (2020)Branch Prediction Attack on Blinded Scalar Multiplication., , , and . IEEE Trans. Computers, 69 (5): 633-648 (2020)Malware Guard Extension: abusing Intel SGX to conceal cache attacks., , , , and . Cybersecur., 3 (1): 2 (2020)Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level., , , , , , , , , and 1 other author(s). EuroS&P Workshops, page 96-102. IEEE, (2021)Reproducing Spectre Attack with gem5: How To Do It Right?, and . EuroSec@EuroSys, page 15-20. ACM, (2021)SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers., , and . EuroS&P, page 472-486. IEEE, (2021)DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting., , , , , , , , , and . NDSS, The Internet Society, (2022)Calibration Done Right: Noiseless Flush+Flush Attacks., and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 278-298. Springer, (2021)Nethammer: Inducing Rowhammer Faults through Network Requests., , , , , , and . EuroS&P Workshops, page 710-719. IEEE, (2020)