Author of the publication

Execution leases: a hardware-supported mechanism for enforcing strong non-interference.

, , , , and . MICRO, page 493-504. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient remote profiling for resource-constrained devices., , , and . ACM Trans. Archit. Code Optim., 3 (1): 35-66 (2006)Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems., , , , and . ACM Trans. Archit. Code Optim., 9 (1): 3:1-3:26 (2012)Eliminating Timing Information Flows in a Mix-Trusted System-on-Chip., , and . IEEE Des. Test, 30 (2): 55-62 (2013)Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). CoRR, (2021)A Pipelined Memory Architecture for High Throughput Network Processors., , and . ISCA, page 288-299. IEEE Computer Society, (2003)On the Limits of Leakage Power Reduction in Caches., , and . HPCA, page 154-165. IEEE Computer Society, (2005)Guiding Architectural SRAM Models., and . ICCD, page 376-382. IEEE, (2006)Extensible control architectures., , and . CASES, page 323-333. ACM, (2006)Towards understanding architectural tradeoffs in MEMS closed-loop feedback control., , and . CASES, page 95-102. ACM, (2007)Boosted Race Trees for Low Energy Classification., , , , and . ASPLOS, page 215-228. ACM, (2019)