Author of the publication

Exploring effective uses of the tagged memory for reducing bounds checking overheads.

, , , , , , , and . J. Supercomput., 79 (1): 1032-1064 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Precise execution offloading for applications with dynamic behavior in mobile cloud computing., , , , , and . Pervasive Mob. Comput., (2016)SBGen: A Framework to Efficiently Supply Runtime Information for a Learning-Based HIDS for Multiple Virtual Machines., , , , and . IEEE Access, (2020)A metadata-driven approach to efficiently detect code-reuse attacks on ARM multiprocessors., , and . J. Supercomput., 77 (7): 7287-7314 (2021)Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM., , , and . NDSS, The Internet Society, (2017)A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications., , , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 694-698. Springer, (2016)ZOMETAG: Zone-Based Memory Tagging for Fast, Deterministic Detection of Spatial Memory Violations on ARM., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)uXOM: Efficient eXecute-Only Memory on ARM Cortex-M., , , , , and . USENIX Security Symposium, page 231-247. USENIX Association, (2019)Fast dynamic execution offloading for efficient mobile cloud computing., , , , , , and . PerCom, page 20-28. IEEE Computer Society, (2013)Instruction-Level Data Isolation for the Kernel on ARM., , and . DAC, page 26:1-26:6. ACM, (2017)Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices., , , , , and . USENIX Annual Technical Conference, page 565-578. USENIX Association, (2016)