Author of the publication

BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors.

, , and . ICCAD, page 1-9. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Greedy Step Averaging: A parameter-free stochastic optimization method., , and . CoRR, (2016)DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips., , and . USENIX Security Symposium, page 1463-1480. USENIX Association, (2020)STREAM: Towards READ-based In-Memory Computing for Streaming based Data Processing., , , , and . ASP-DAC, page 690-695. IEEE, (2022)Personalized Decision Supports based on Theory of Mind Modeling and Explainable Reinforcement Learning., , , , and . SMC, page 4865-4870. IEEE, (2023)Decepticon: Attacking Secrets of Transformers., , , , and . IISWC, page 128-139. IEEE, (2023)Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms., , and . COLT, volume 178 of Proceedings of Machine Learning Research, page 543. PMLR, (2022)Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors., , , , and . SP, page 1440-1457. IEEE, (2022)A Noise-resilient Detection Method against Advanced Cache Timing Channel Attack., , , , and . ACSSC, page 237-241. IEEE, (2018)Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures., , and . ACM Great Lakes Symposium on VLSI, page 155-160. ACM, (2017)StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution., , , , , and . DSN, page 109-120. IEEE Computer Society, (2017)