From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SHELTER: Extending Arm CCA with Isolation in User Space., , , , , , , и . USENIX Security Symposium, стр. 6257-6274. USENIX Association, (2023)Understanding the Security of Traffic Signal Infrastructure., , и . DIMVA, том 11543 из Lecture Notes in Computer Science, стр. 154-174. Springer, (2019)The CAP Principle for LLM Serving: A Survey of Long-Context Large Language Model Serving., , , , , , , и . CoRR, (2024)KShot: Live Kernel Patching with SMM and SGX., , , , , , , и . DSN, стр. 1-13. IEEE, (2020)Revisiting ARM Debugging Features: Nailgun and its Defense., , , , и . IEEE Trans. Dependable Secur. Comput., 20 (1): 574-589 (2023)Ninja: Towards Transparent Tracing and Debugging on ARM., и . USENIX Security Symposium, стр. 33-49. USENIX Association, (2017)DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis., и . DSN, стр. 690-701. IEEE Computer Society, (2018)A Novel Memory Management for RISC-V Enclaves., , , , , , и . HASP@MICRO, стр. 3:1-3:9. ACM, (2021)RetTag: hardware-assisted return address integrity on RISC-V., , , , и . EuroSec@EUROSYS, стр. 50-56. ACM, (2022)Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features., , , , , , и . ISSTA, стр. 917-928. ACM, (2023)