Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy., , , , , , and . ACM Queue, 21 (4): 94-122 (2023)Consistency in Distributed Systems (Dagstuhl Seminar 13081)., , , , and . Dagstuhl Reports, 3 (2): 92-126 (2013)A Predictive Performance Model for Superscalar Processors., , and . MICRO, page 161-170. IEEE Computer Society, (2006)SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution., , , , , and . FAST, page 173-190. USENIX Association, (2019)Simple, fast, and safe manual memory management., , , , , and . PLDI, page 233-247. ACM, (2017)CScale - A Programming Model for Scalable and Reliable Distributed Applications., , , , and . Monterey Workshop, volume 7539 of Lecture Notes in Computer Science, page 148-156. Springer, (2012)Fault tolerance via idempotence., and . POPL, page 249-262. ACM, (2013)DICE*: A Formally Verified Implementation of DICE Measured Boot., , , , and . USENIX Security Symposium, page 1091-1107. USENIX Association, (2021)Quantifying the effectiveness of testing via efficient residual path profiling., , and . ESEC/SIGSOFT FSE, page 545-548. ACM, (2007)Modular Heap Analysis for Higher-Order Programs., , and . SAS, volume 7460 of Lecture Notes in Computer Science, page 370-387. Springer, (2012)