Author of the publication

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.

, , , , , , and . ACM Conference on Computer and Communications Security, page 785-800. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two methods for exploiting speculative control flow hijacks., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Speculator: a tool to analyze speculative execution attacks and mitigations., , , , , and . ACSAC, page 747-761. ACM, (2019)GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , and . SANER, page 307-317. IEEE, (2021)How to Bind Anonymous Credentials to Humans., , and . USENIX Security Symposium, page 3047-3064. USENIX Association, (2023)Bypassing memory safety mechanisms through speculative control flow hijacks., , , , , and . CoRR, (2020)Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric., , , and . SRDS, page 324-333. IEEE, (2019)Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example., , and . ICSOC Workshops, volume 12019 of Lecture Notes in Computer Science, page 181-194. Springer, (2019)StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases., , , and . Blockchain, page 130-139. IEEE, (2021)Endorsement in Hyperledger Fabric., , , and . Blockchain, page 510-519. IEEE, (2019)Memory Categorization: Separating Attacker-Controlled Data., , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 263-287. Springer, (2019)