Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures., , , , and . CoRR, (2023)Customized Instructions for Protection Against Memory Integrity Attacks., , , , , , and . IEEE Embed. Syst. Lett., 10 (3): 91-94 (2018)Exploring Micro-architectural Side-Channel Leakages through Statistical Testing., and . DATE, page 633-636. IEEE, (2021)Cache Wars: A Comparative Study of UMWAIT, UMONITOR, and Prime-Probe Attacks., , and . HOST, page 86-89. IEEE, (2024)RAPPER: Ransomware Prevention via Performance Counters., , , and . CoRR, (2018)Breaking KASLR on Mobile Devices without Any Use of Cache Memory., , , , and . ASHES@CCS, page 45-54. ACM, (2022)Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches., , , and . HPCA, page 233-246. IEEE, (2023)Unraveling timewarp: what all the fuzz is about?, , and . HASP@ISCA, page 8. ACM, (2013)A Formal Security Analysis of Even-Odd Sequential Prefetching in Profiled Cache-Timing Attacks., , and . HASP@ISCA, page 6:1-6:8. ACM, (2016)RAPPER: Ransomware Prevention via Performance Counters., , , , , and . CoRR, (2020)