Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OS-level Software & Hardware Attacks and Defenses.. PhD Forum@MobiSys, page 7-8. ACM, (2018)SANCTUARY: ARMing TrustZone with User-space Enclaves., , , , and . NDSS, The Internet Society, (2019)FastKitten: Practical Smart Contracts on Bitcoin., , , , , , , and . USENIX Security Symposium, page 801-818. USENIX Association, (2019)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , and . USENIX Security Symposium, page 1445-1461. USENIX Association, (2020)RIP-RH: Preventing Rowhammer-based Inter-Process Attacks., , , , and . AsiaCCS, page 561-572. ACM, (2019)A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing., , , , and . ESEC/SIGSOFT FSE, page 821-831. ACM, (2023)BinRec: dynamic binary lifting and recompilation., , , , , , , , , and 2 other author(s). EuroSys, page 36:1-36:16. ACM, (2020)V0LTpwn: Attacking x86 Processor Integrity from Software., , , , and . CoRR, (2019)MCAD: Beyond Basic-Block Throughput Estimation Through Differential, Instruction-Level Tracing., , and . CoRR, (2022)StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries., , and . AISec@CCS, page 85-95. ACM, (2021)