Author of the publication

HashTag: Hash-based Integrity Protection for Tagged Architectures.

, , , and . USENIX Security Symposium, page 2797-2814. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nethammer: Inducing Rowhammer Faults through Network Requests., , , , , , and . EuroS&P Workshops, page 710-719. IEEE, (2020)CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer., , , , , and . SP, page 1702-1718. IEEE, (2023)HashTag: Hash-based Integrity Protection for Tagged Architectures., , , and . USENIX Security Symposium, page 2797-2814. USENIX Association, (2023)SPEAR-V: Secure and Practical Enclave Architecture for RISC-V., , , , and . AsiaCCS, page 457-468. ACM, (2023)Cryptographically Enforced Memory Safety., , , , and . CCS, page 889-903. ACM, (2023)Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging., , , , , and . AsiaCCS, page 177-189. ACM, (2023)Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels., , , and . USENIX Security Symposium, USENIX Association, (2024)Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC., , , and . USENIX Security Symposium, USENIX Association, (2024)