Author of the publication

Demystifying Pointer Authentication on Apple M1.

, , , , , , , and . USENIX Security Symposium, page 2833-2848. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing wind/solar combinations at finer scales to mitigate renewable energy variability in China, , , , , , , , , and 3 other author(s). Renewable and Sustainable Energy Reviews, (2020)PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot., , , , , , , , and . CoRR, (2022)A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices., , , , , , , and . CoRR, (2021)Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem., , , , , , , and . CoRR, (2023)TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum., , , , , , , , and . CCS, page 120-134. ACM, (2023)Exploring the Reproducibility of Probabilistic Causal Molecular Network Models>., , , , , , , , and . PSB, page 120-131. (2017)Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem., , , , , , , and . ICSE, page 24:1-24:13. ACM, (2024)An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3501-3514 (July 2024)A Closer Look at the Security Risks in the Rust Ecosystem., , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 34:1-34:30 (February 2024)A Comprehensive Study on ARM Disassembly Tools., , , , , , , , and . IEEE Trans. Software Eng., 49 (4): 1683-1703 (April 2023)