Author of the publication

MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols.

, , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models., , , , and . CAV (2), volume 13965 of Lecture Notes in Computer Science, page 383-396. Springer, (2023)Scaling Up Hardware Accelerator Verification using A-QED with Functional Decomposition., , , , , , , , , and 5 other author(s). FMCAD, page 42-52. IEEE, (2021)SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing., , , , , and . HASP@MICRO, page 8:1-8:9. ACM, (2020)Axiomatic hardware-software contracts for security., , , and . ISCA, page 72-86. ACM, (2022)Model Selection for Latency-Critical Inference Serving., , and . EuroSys, page 1016-1038. ACM, (2024)Mitigating Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). BMVC, page 106. BMVA Press, (2021)RecSSD: near data processing for solid state drive based recommendation inference., , , , , , and . ASPLOS, page 717-729. ACM, (2021)Synthesizing Formal Models of Hardware from RTL for Efficient Verification of Memory Model Implementations., , , , and . MICRO, page 679-694. ACM, (2021)Understanding and Improving Failure Tolerant Training for Deep Learning Recommendation with Partial Recovery., , , , , , , , , and 1 other author(s). MLSys, mlsys.org, (2021)Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors., , , , , , , , , and 2 other author(s). CoRR, (2021)