Author of the publication

Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.

, , , and . AsiaCCS, page 7-18. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps., , and . IEEE Symposium on Security and Privacy, page 1296-1310. IEEE, (2019)SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels., , , , and . PACT, page 151-164. IEEE, (2019)A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites., , , , and . ACSAC, page 89-100. ACM, (2018)Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps., , , and . ACM Conference on Computer and Communications Security, page 1469-1483. ACM, (2019)OPERA: Open Remote Attestation for Intel's Secure Enclaves., , and . ACM Conference on Computer and Communications Security, page 2317-2331. ACM, (2019)Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud., and . ACM Conference on Computer and Communications Security, page 827-838. ACM, (2013)Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses., , , , , , and . AsiaCCS, page 601-608. ACM, (2018)Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach., , , , , and . AsiaCCS, page 114-121. ACM, (2019)CPU Elasticity to Mitigate Cross-VM Runtime Monitoring., , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (5): 1094-1108 (2020)Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4154-4168 (September 2023)