From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NetSpectre: Read Arbitrary Memory over Network., , , , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 279-299. Springer, (2019)ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture., , , , , и . USENIX Security Symposium, стр. 3917-3934. USENIX Association, (2022)Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis., , , и . USENIX Security Symposium, стр. 1427-1444. USENIX Association, (2020)Nethammer: Inducing Rowhammer Faults through Network Requests., , , , , , и . EuroS&P Workshops, стр. 710-719. IEEE, (2020)Meltdown: reading kernel memory from user space., , , , , , , , , и 2 other автор(ы). Commun. ACM, 63 (6): 46-56 (2020)Meltdown: Reading Kernel Memory from User Space., , , , , , , , , и 2 other автор(ы). USENIX Security Symposium, стр. 973-990. USENIX Association, (2018)ConTExT: A Generic Approach for Mitigating Spectre., , , , , и . NDSS, The Internet Society, (2020)Remote Memory-Deduplication Attacks., , , и . CoRR, (2021)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , и 2 other автор(ы). CCS, стр. 769-784. ACM, (2019)LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection., , , , , , , , , и . SP, стр. 54-72. IEEE, (2020)