Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Verification of Low-Trust Architectures., , , , , , and . CCS, page 945-959. ACM, (2023)Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation., , , and . MICRO, page 97-108. IEEE Computer Society, (2007)Compiler controlled value prediction using branch predictor based confidence., and . MICRO, page 327-336. ACM/IEEE Computer Society, (2000)Efficient Detection of All Pointer and Array Access Errors., , and . PLDI, page 290-301. ACM, (1994)Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces., , , and . HOST, page 57-68. IEEE, (2020)Architectural implications of brick and mortar silicon manufacturing., , , and . ISCA, page 244-253. ACM, (2007)Cyclone: A Broadcast-Free Dynamic Instruction Scheduler with Selective Replay., , and . ISCA, page 253-262. IEEE Computer Society, (2003)Schnauzer: scalable profiling for likely security bug sites., , , , and . CGO, page 24:1-24:11. IEEE Computer Society, (2013)Architectural Support for Fast Symmetric-Key Cryptography., , and . ASPLOS, page 178-189. ACM Press, (2000)Reducing pipeline energy demands with local DVS and dynamic retiming., , , , , and . ISLPED, page 319-324. ACM, (2004)