Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit., , , and . HPCA, page 123-138. IEEE, (2020)Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation., , , , , and . IEEE PACT, page 170-181. IEEE Computer Society, (2003)A Hierarchical Subsequence Clustering Method for Tracking Program States in Spectrograms., , , and . MILCOM, page 855-860. IEEE, (2021)ReEnact: Using Thread-Level Speculation Mechanisms to Debug Data Races in Multithreaded Codes., and . ISCA, page 110-121. IEEE Computer Society, (2003)CORD: cost-effective (and nearly overhead-free) order-recording and data race detection.. HPCA, page 232-243. IEEE Computer Society, (2006)Transactional pre-abort handlers in hardware transactional memory., , and . PACT, page 33:1-33:11. ACM, (2018)SecureME: a hardware-software approach to full system security., , , and . ICS, page 108-119. ACM, (2011)Modelling Jitter in Wireless Channel Created by Processor-Memory Activity., , and . ICASSP, page 2037-2041. IEEE, (2018)PEEP: Exploiting predictability of memory dependences in SMT processors., , and . HPCA, page 137-148. IEEE Computer Society, (2008)Single-level integrity and confidentiality protection for distributed shared memory multiprocessors., , , , and . HPCA, page 161-172. IEEE Computer Society, (2008)