From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86., , , , , , и . USENIX Security Symposium, стр. 1677-1694. USENIX Association, (2020)Practical Timing Side-Channel Attacks on Memory Compression., , , , , и . SP, стр. 1186-1203. IEEE, (2023)Speculative Dereferencing of Registers: Reviving Foreshadow., , , и . CoRR, (2020)Robust and Scalable Process Isolation Against Spectre in the Cloud., , , , , , и . ESORICS (2), том 13555 из Lecture Notes in Computer Science, стр. 167-186. Springer, (2022)NetSpectre: Read Arbitrary Memory over Network., , , , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 279-299. Springer, (2019)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , и . CoRR, (2021)ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture., , , , , и . USENIX Security Symposium, стр. 3917-3934. USENIX Association, (2022)Rapid Prototyping for Microarchitectural Attacks., , , и . USENIX Security Symposium, стр. 3861-3877. USENIX Association, (2022)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , и . ICISSP, стр. 48-59. SCITEPRESS, (2022)Layered Binary Templating., , и . ACNS (1), том 13905 из Lecture Notes in Computer Science, стр. 33-58. Springer, (2023)