Author of the publication

A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks.

, , , and . HPCA, page 201-212. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking Memory Permissions for Protection Against Cross-Layer Attacks., , , , and . ACM Trans. Archit. Code Optim., 12 (4): 56:1-56:27 (2016)Your culture is in your password: An analysis of a demographically-diverse password dataset., , and . Comput. Secur., (2018)A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks., , , and . HPCA, page 201-212. IEEE Computer Society, (2014)BranchScope: A New Side-Channel Attack on Directional Branch Predictor., , , and . ASPLOS, page 693-707. ACM, (2018)On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters., , , , and . AsiaCCS, page 483-493. ACM, (2017)Hardening extended memory access control schemes with self-verified address spaces., , , , and . ICCAD, page 392-399. IEEE, (2017)Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution., , , , , and . MICRO, page 190-202. IEEE Computer Society, (2014)Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (3): 437-451 (2018)Port or Shim? Stress Testing Application Performance on Intel SGX., , and . IISWC, page 123-133. IEEE, (2020)DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications., , , , , and . DSN, page 415-426. IEEE Computer Society, (2017)