From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SGXIO: Generic Trusted I/O Path for Intel SGX., и . CODASPY, стр. 261-268. ACM, (2017)Jenny: Securing Syscalls for PKU-based Memory Isolation Systems., , , и . USENIX Security Symposium, стр. 936-952. USENIX Association, (2022)SERVAS! Secure Enclaves via RISC-V Authenticryption Shield., , , , и . ESORICS (2), том 12973 из Lecture Notes in Computer Science, стр. 370-391. Springer, (2021)Practical Enclave Malware with Intel SGX., , и . DIMVA, том 11543 из Lecture Notes in Computer Science, стр. 177-196. Springer, (2019)Malware Guard Extension: abusing Intel SGX to conceal cache attacks., , , , и . Cybersecur., 3 (1): 2 (2020)DATA - Differential Address Trace Analysis., , , , , и . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Single Trace Attack Against RSA Key Generation in Intel SGX SSL., , и . AsiaCCS, стр. 575-586. ACM, (2018)Measured Firmware Deployment for Embedded Microcontroller Platforms., , и . PECCS, стр. 237-246. SciTePress, (2014)Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations., , , и . USENIX Security Symposium, стр. 1767-1784. USENIX Association, (2020)TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V., , , , , и . NDSS, The Internet Society, (2019)