Author of the publication

Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract.

, , , , , and . OSDI, page 1139-1154. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Enforcement of Application Security Policies Using Tagged Memory., , , and . OSDI, page 225-240. USENIX Association, (2008)Aardvark: A Concurrent Authenticated Dictionary with Short Proofs., , , , and . IACR Cryptol. ePrint Arch., (2020)VerSum: Verifiable Computations over Large Public Logs., , and . ACM Conference on Computer and Communications Security, page 1304-1316. ACM, (2014)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , and . NSDI, page 157-172. USENIX Association, (2014)Nail: A Practical Tool for Parsing and Generating Data Formats., and . OSDI, page 615-628. USENIX Association, (2014)Verifying vMVCC, a high-performance transaction library using multi-version concurrency control., , , , , and . OSDI, page 871-886. USENIX Association, (2023)Groove: Flexible Metadata-Private Messaging., , , , and . OSDI, page 735-750. USENIX Association, (2022)Verifying the DaisyNFS concurrent and crash-safe file system with sequential reasoning., , , , and . OSDI, page 447-463. USENIX Association, (2022)Private Web Search with Tiptoe., , , and . SOSP, page 396-416. ACM, (2023)A Trigger-Based Middleware Cache for ORMs., , and . Middleware, volume 7049 of Lecture Notes in Computer Science, page 329-349. Springer, (2011)