Author of the publication

Verifying Hardware Security Modules with Information-Preserving Refinement.

, , and . OSDI, page 503-519. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Analysis of Defenses against Return-Oriented Programming., , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 82-102. Springer, (2013)Hardware Enforcement of Application Security Policies Using Tagged Memory., , , and . OSDI, page 225-240. USENIX Association, (2008)Aardvark: A Concurrent Authenticated Dictionary with Short Proofs., , , , and . IACR Cryptol. ePrint Arch., (2020)VerSum: Verifiable Computations over Large Public Logs., , and . ACM Conference on Computer and Communications Security, page 1304-1316. ACM, (2014)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)A Trigger-Based Middleware Cache for ORMs., , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 329-349. Springer, (2011)Verifying vMVCC, a high-performance transaction library using multi-version concurrency control., , , , , and . OSDI, page 871-886. USENIX Association, (2023)Nail: A Practical Tool for Parsing and Generating Data Formats., and . OSDI, page 615-628. USENIX Association, (2014)Groove: Flexible Metadata-Private Messaging., , , , and . OSDI, page 735-750. USENIX Association, (2022)Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning., , , , and . OSDI, page 447-463. USENIX Association, (2022)