Author of the publication

PIFT: efficient dynamic information flow tracking using secure page allocation.

, , and . WESS, ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An energy-aware framework for dynamic software management in mobile computing systems, , and . ACM Trans. Embed. Comput. Syst., 7 (3): 1--31 (2008)A Statistical Model for Higher Order DPA on Masked Devices., , , and . CHES, volume 8731 of Lecture Notes in Computer Science, page 147-169. Springer, (2014)Design of an application-specific instruction set processor for high-throughput and scalable FFT., , and . DATE, page 1302-1307. IEEE, (2009)Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security., , , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 29:1-29:4 (2021)VertexSerum: Poisoning Graph Neural Networks for Link Inference., , , and . ICCV, page 4509-4518. IEEE, (2023)Automatic Detection and Repair of Transition- Based Leakage in Software Binaries., , , and . VSTTE, volume 12549 of Lecture Notes in Computer Science, page 50-67. Springer, (2020)An Energy-Efficient Neural Network Accelerator with Improved Protections Against Fault-Attacks., , , , and . ESSCIRC, page 233-236. IEEE, (2023)Ran$Net: An Anti-Ransomware Methodology based on Cache Monitoring and Deep Learning., , , , , and . ACM Great Lakes Symposium on VLSI, page 487-492. ACM, (2022)An Adaptive and Energy-efficient Routing Protocol Based on Machine Learning for Underwater Delay Tolerant Networks., and . MASCOTS, page 381-384. IEEE Computer Society, (2010)Towards Sound and Optimal Leakage Detection Procedure., , , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 105-122. Springer, (2017)