Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAPPER: Ransomware Prevention via Performance Counters., , , and . CoRR, (2018)Breaking KASLR on Mobile Devices without Any Use of Cache Memory., , , , and . ASHES@CCS, page 45-54. ACM, (2022)Are Randomized Caches Truly Random? Formal Analysis of Randomized-Partitioned Caches., , , and . HPCA, page 233-246. IEEE, (2023)Unraveling timewarp: what all the fuzz is about?, , and . HASP@ISCA, page 8. ACM, (2013)Branch Prediction Attack on Blinded Scalar Multiplication., , , and . IEEE Trans. Computers, 69 (5): 633-648 (2020)Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses., and . IACR Cryptology ePrint Archive, (2014)Customized Instructions for Protection Against Memory Integrity Attacks., , , , , , and . IEEE Embed. Syst. Lett., 10 (3): 91-94 (2018)Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory., , , and . IACR Cryptol. ePrint Arch., (2020)On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures., , , , and . CoRR, (2023)Exploring Micro-architectural Side-Channel Leakages through Statistical Testing., and . DATE, page 633-636. IEEE, (2021)