Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version)., , , , , , , , , and 5 other author(s). CoRR, (2024)Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version)., , , , , , , and . CoRR, (2020)SoK: Practical Foundations for Software Spectre Defenses., , , , and . SP, page 666-680. IEEE, (2022)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code., , , , , , , , , and . CoRR, (2022)Constant-time foundations for the new spectre era., , , , , , and . PLDI, page 913-926. ACM, (2020)The Code That Never Ran: Modeling Attacks on Speculative Evaluation., , , and . IEEE Symposium on Security and Privacy, page 1238-1255. IEEE, (2019)The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing., , , , and . login Usenix Mag., (2020)Memory Safety for Today's Languages and Architectures. University of California, San Diego, USA, (2022)Position Paper: Progressive Memory Safety for WebAssembly., , , , , and . HASP@ISCA, page 4:1-4:8. ACM, (2019)Improved Performance of Gene Set Analysis on Genome-Wide Transcriptomics Data when Using Gene Activity State Estimates., , , and . PSB, page 449-460. (2017)