Author of the publication

Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines.

, , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (4): 53:1-53:32 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hardware-based technique for efficient implicit information flow tracking., , , , , , and . ICCAD, page 94. ACM, (2016)Towards a practical solution to detect code reuse attacks on ARM mobile devices., , , , and . HASP@ISCA, page 3:1-3:8. ACM, (2015)Compiler and microarchitectural approaches for register file thermal management., , and . ISCAS, page 257-260. IEEE, (2012)Exploiting Both Pipelining and Data Parallelism with SIMD Reconfigurable Architecture., , , , , and . ARC, volume 7199 of Lecture Notes in Computer Science, page 40-52. Springer, (2012)Extrax: security extension to extract cache resident information for snoop-based external monitors., , , , and . DATE, page 151-156. ACM, (2015)Integration of ROP/JOP monitoring IPs in an ARM-based SoC., , , , and . DATE, page 331-336. IEEE, (2016)Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines., , , , , , and . ACM Trans. Design Autom. Electr. Syst., 20 (4): 53:1-53:32 (2015)Efficient dynamic information flow tracking on a processor with core debug interface., , , and . DAC, page 79:1-79:6. ACM, (2015)Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping., , , , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 145-157 (2017)