Author of the publication

PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.

, , , , , and . DSN, page 95-108. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels., , , , , , , and . USENIX Security Symposium, page 7285-7302. USENIX Association, (2023)Presshammer: Rowhammer and Rowpress Without Physical Address Information., , , , , and . DIMVA, volume 14828 of Lecture Notes in Computer Science, page 460-479. Springer, (2024)SQUIP: Exploiting the Scheduler Queue Contention Side Channel., , , , , , , and . SP, page 2256-2272. IEEE, (2023)Another Flip in the Wall of Rowhammer Defenses., , , , , , , and . IEEE Symposium on Security and Privacy, page 245-261. IEEE Computer Society, (2018)SUIT: Secure Undervolting with Instruction Traps., , , and . ASPLOS (2), page 1128-1145. ACM, (2024)Half-Double: Hammering From the Next Row Over., , , , , , , , and . USENIX Security Symposium, page 3807-3824. USENIX Association, (2022)CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer., , , , , and . SP, page 1702-1718. IEEE, (2023)IdleLeak: Exploiting Idle State Side Effects for Information Leakage., , , and . NDSS, The Internet Society, (2024)Remote Scheduler Contention Attacks., , , , , and . CoRR, (2024)SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript., , , , , and . USENIX Security Symposium, USENIX Association, (2024)