From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

OS-level Software & Hardware Attacks and Defenses.. PhD Forum@MobiSys, стр. 7-8. ACM, (2018)SANCTUARY: ARMing TrustZone with User-space Enclaves., , , , и . NDSS, The Internet Society, (2019)RIP-RH: Preventing Rowhammer-based Inter-Process Attacks., , , , и . AsiaCCS, стр. 561-572. ACM, (2019)BinRec: dynamic binary lifting and recompilation., , , , , , , , , и 2 other автор(ы). EuroSys, стр. 36:1-36:16. ACM, (2020)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , и . USENIX Security Symposium, стр. 801-818. USENIX Association, (2019)A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing., , , , и . ESEC/SIGSOFT FSE, стр. 821-831. ACM, (2023)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . USENIX Security Symposium, стр. 1445-1461. USENIX Association, (2020)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . CoRR, (2019)MCAD: Beyond Basic-Block Throughput Estimation Through Differential, Instruction-Level Tracing., , и . CoRR, (2022)PKRU-safe: automatically locking down the heap between safe and unsafe languages., , , , , , , , и . EuroSys, стр. 132-148. ACM, (2022)