Author of the publication

SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels.

, , , , and . PACT, page 151-164. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Respin: Rethinking Near-Threshold Multiprocessor Design with Non-volatile Memory., , and . IPDPS, page 265-275. IEEE Computer Society, (2017)Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors., and . ISCA, page 297-307. ACM, (2013)Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses., , , , , and . IEEE Access, (2021)Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware., , , , and . RAID, page 413-426. USENIX Association, (2020)Seamlessly Safeguarding Data Against Ransomware Attacks., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 1-16 (2023)Using ECC Feedback to Guide Voltage Speculation in Low-Voltage Processors., and . MICRO, page 306-318. IEEE Computer Society, (2014)SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels., , , , and . PACT, page 151-164. IEEE, (2019)An Application Agnostic Defense Against the Dark Arts of Cryptojacking., , , and . DSN, page 314-325. IEEE, (2021)Authenticache: harnessing cache ECC for system authentication., and . MICRO, page 128-140. ACM, (2015)Adaptive parallel execution of deep neural networks on heterogeneous edge devices., , , , and . SEC, page 195-208. ACM, (2019)