From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Meltdown., , , , , , , , , и . CoRR, (2018)Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android., , , и . WISEC, стр. 49-60. ACM, (2016)Exploiting the Difference of Side-Channel Leakages., , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2012)Protecting the Control Flow of Embedded Processors against Fault Attacks., , и . CARDIS, том 9514 из Lecture Notes in Computer Science, стр. 161-176. Springer, (2015)Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults., , , , , , , , и . IACR Cryptol. ePrint Arch., (2024)Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs., , , , и . IACR Cryptol. ePrint Arch., (2020)Power Contracts: Provably Complete Power Leakage Models for Processors., , , , , и . CCS, стр. 381-395. ACM, (2022)FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication., , и . COSADE, том 13211 из Lecture Notes in Computer Science, стр. 100-124. Springer, (2022)MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware., , , , , , , и . SECRYPT, стр. 25-36. SCITEPRESS, (2023)Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86., , , , , , и . USENIX Security Symposium, стр. 1677-1694. USENIX Association, (2020)