From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic Binary Translation for SGX Enclaves., , , , и . ACM Trans. Priv. Secur., 25 (4): 32:1-32:40 (2022)ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators., , , , , и . CoRR, (2023)SoK: Hardware-supported Trusted Execution Environments., , , , и . CoRR, (2022)It's TEEtime: Bringing User Sovereignty to Smartphones., , , , , и . CoRR, (2022)SmashEx: Smashing SGX Enclaves Using Exceptions., , , , и . CCS, стр. 779-793. ACM, (2021)Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3., , и . USENIX Security Symposium, стр. 769-786. USENIX Association, (2023)HECKLER: Breaking Confidential VMs with Malicious Interrupts., , , , и . USENIX Security Symposium, USENIX Association, (2024)Elasticlave: An Efficient Memory Model for Enclaves., , , и . USENIX Security Symposium, стр. 4111-4128. USENIX Association, (2022)Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints., , , , и . NDSS, The Internet Society, (2019)BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof., , , , , и . USENIX Security Symposium, стр. 523-540. USENIX Association, (2020)