Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection., , , , , , , , , and . SP, page 54-72. IEEE, (2020)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , and 2 other author(s). CCS, page 769-784. ACM, (2019)Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning., , , , , and . CoRR, (2023)Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing., , , , , , , , , and 2 other author(s). IEEE Micro, 44 (4): 70-79 (July 2024)Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis., , , and . USENIX Security Symposium, page 1427-1444. USENIX Association, (2020)Swivel: Hardening WebAssembly against Spectre., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1433-1450. USENIX Association, (2021)EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security., , , , , and . MICRO, page 1218-1236. IEEE, (2022)JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (3): 169-195 (2020)Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor., , , , , , , , , and . ASPLOS (3), page 770-784. ACM, (2024)SoK: Practical Foundations for Spectre Defenses., , , , and . CoRR, (2021)