Author of the publication

Architectural Supports to Protect OS Kernels from Code-Injection Attacks.

, , , , , and . HASP@ISCA, page 5:1-5:8. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzing File Systems via Two-Dimensional Input Space Exploration., , , , and . IEEE Symposium on Security and Privacy, page 818-834. IEEE, (2019)Architectural Supports to Protect OS Kernels from Code-Injection Attacks., , , , , and . HASP@ISCA, page 5:1-5:8. ACM, (2016)Kernel Code Integrity Protection at the Physical Address Level on RISC-V., , , and . IEEE Access, (2023)Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices., , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 364-383. Springer, (2022)Protecting Kernel Code Integrity with PMP on RISC-V., and . WISA, volume 14402 of Lecture Notes in Computer Science, page 231-243. Springer, (2023)Extrax: security extension to extract cache resident information for snoop-based external monitors., , , , and . DATE, page 151-156. ACM, (2015)Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications., , , , , and . ACM Trans. Design Autom. Electr. Syst., 23 (1): 10:1-10:25 (2017)Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices., , , , , and . CoRR, (2024)Vigilare: toward snoop-based kernel integrity monitor., , , , , and . CCS, page 28-37. ACM, (2012)A Log-Structured Merge Tree-aware Message Authentication Scheme for Persistent Key-Value Stores., , , , and . FAST, page 363-380. USENIX Association, (2022)