Author of the publication

CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (5): 1094-1108 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption., , , and . IACR Cryptol. ePrint Arch., (2021)Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu., , , and . AsiaCCS, page 7-18. ACM, (2017)The Netivus Manifesto: making collaborative network management easier for the rest of us., , , , and . Comput. Commun. Rev., 51 (2): 10-17 (2021)Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection., , , , and . CoRR, (2019)Secure Execution of Java Applets Using a Remote Playground., and . IEEE Trans. Software Eng., 26 (12): 1197-1209 (2000)A Secure Group Membership Protocol.. IEEE Trans. Software Eng., 22 (1): 31-42 (1996)Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games., , , , and . CoRR, (2021)Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models., , and . CoRR, (2024)To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings., , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 119-137 (2017)Bounded vector signatures and their applications., , and . AsiaCCS, page 277-285. ACM, (2011)