From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning., , , , , и . CoRR, (2023)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , и 2 other автор(ы). CCS, стр. 769-784. ACM, (2019)LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection., , , , , , , , , и . SP, стр. 54-72. IEEE, (2020)TPM-FAIL: TPM meets Timing and Lattice Attacks., , , и . CoRR, (2019)SoK: Practical Foundations for Software Spectre Defenses., , , , и . SP, стр. 666-680. IEEE, (2022)Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI., , , , , , , , , и 2 other автор(ы). ASPLOS (3), стр. 266-281. ACM, (2023)Fallout: Reading Kernel Writes From User Space., , , , , , , , , и . CoRR, (2019)A Turning Point for Verified Spectre Sandboxing., , , , и . CoRR, (2022)JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms., , , , , и . CoRR, (2019)CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction., , , , и . CoRR, (2020)