Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , and . CoRR, (2018)Evolution of Defenses against Transient-Execution Attacks., , , and . ACM Great Lakes Symposium on VLSI, page 169-174. ACM, (2020)The Evolution of Transient-Execution Attacks., , and . ACM Great Lakes Symposium on VLSI, page 163-168. ACM, (2020)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , and . CoRR, (2021)Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks., , , , , , , and . ICISSP, page 48-59. SCITEPRESS, (2022)ConTExT: Leakage-Free Transient Execution., , , , , and . CoRR, (2019)Automating Seccomp Filter Generation for Linux Applications., , , and . CoRR, (2020)A Systematic Evaluation of Transient Execution Attacks and Defenses., , , , , , , , and . USENIX Security Symposium, page 249-266. USENIX Association, (2019)PLATYPUS: Software-based Power Side-Channel Attacks on x86., , , , , , and . SP, page 355-371. IEEE, (2021)Specfuscator: Evaluating Branch Removal as a Spectre Mitigation., , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 293-310. Springer, (2021)