Author of the publication

CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix.

, , and . ACM Trans. Embed. Comput. Syst., 15 (1): 15:1-15:25 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position., , , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 46-59. Springer, (2015)Obsidian: A scalable and efficient framework for NetFlow obfuscation., , , , and . INFOCOM, page 7-8. IEEE, (2013)Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets., , , , and . ICETE (Selected Papers), volume 455 of Communications in Computer and Information Science, page 192-208. Springer, (2012)Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey., , , , and . ISSRE Workshops, page 389-394. IEEE Computer Society, (2014)Obfuscation of sensitive data in network flows., , , , and . INFOCOM, page 2372-2380. IEEE, (2012)A Simple FORTRAN Support for Computer-Assisted Instruction., , , , and . Inf. Process. Lett., 3 (3): 88-90 (1975)Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers., , , , , and . CoRR, (2013)DDoS Detection with Information Theory Metrics and Netflows - A Real Case., , , , and . SECRYPT, page 172-181. SciTePress, (2012)CUDA Leaks: Information Leakage in GPU Architectures., , and . CoRR, (2013)No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position., , , , and . CoRR, (2015)