From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GhostKnight: Breaching Data Integrity via Speculative Execution., , , и . CoRR, (2020)SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks., , , , , , , , , и . CoRR, (2023)SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities., , и . CoRR, (2019)CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV., , и . CCS, стр. 2937-2950. ACM, (2021)Cache Side Channels: State of the Art and Research Opportunities.. CCS, стр. 2617-2619. ACM, (2017)Differentially Private Access Patterns for Searchable Symmetric Encryption., , , и . INFOCOM, стр. 810-818. IEEE, (2018)Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures., , , и . NDSS, The Internet Society, (2022)CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel., , , , и . USENIX Security Symposium, стр. 717-732. USENIX Association, (2021)ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX., , , и . SEED, стр. 145-156. IEEE, (2022)TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments., , , , и . ISCA, стр. 35:1-35:15. ACM, (2023)