Author of the publication

Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend.

, , , and . USENIX Security Symposium, page 663-680. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Bottleneck Bandwidth Estimation Techniques., , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 121-141. Springer, (2009)Assisted deletion of related content., , and . ACSAC, page 206-215. ACM, (2014)Small worlds in security systems: an analysis of the PGP certificate graph., , and . NSPW, page 28-35. ACM, (2002)Attacks on physical-layer identification., , , and . WISEC, page 89-98. ACM, (2010)Using hover to compromise the confidentiality of user input on Android., , , , and . WISEC, page 12-22. ACM, (2017)Evaluating User Privacy in Bitcoin., , , , and . IACR Cryptology ePrint Archive, (2012)Physical-layer Identification of RFID Devices., , and . USENIX Security Symposium, page 199-214. USENIX Association, (2009)On the requirements for successful GPS spoofing attacks., , , and . ACM Conference on Computer and Communications Security, page 75-86. ACM, (2011)Proximity-based access control for implantable medical devices., , , and . ACM Conference on Computer and Communications Security, page 410-419. ACM, (2009)Location privacy of distance bounding protocols., and . ACM Conference on Computer and Communications Security, page 149-160. ACM, (2008)