Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DOLMA: Securing Speculation with the Principle of Transient Non-Observability., , , , , , and . USENIX Security Symposium, page 1397-1414. USENIX Association, (2021)Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer., , , , , and . SOSP, page 417-433. ACM, (2023)A Hypervisor for Shared-Memory FPGA Platforms., , , , , , , and . ASPLOS, page 827-844. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..NDA: Preventing Speculative Execution Attacks at Their Source., , , , and . MICRO, page 572-586. ACM, (2019)Debugging in the brave new world of reconfigurable hardware., , , , , and . ASPLOS, page 946-962. ACM, (2022)Stop! Hammer time: rethinking our approach to rowhammer mitigations., , , and . HotOS, page 88-95. ACM, (2021)MOESI-prime: preventing coherence-induced hammering in commodity workloads., , , , and . ISCA, page 670-684. ACM, (2022)Kinetics of sorption in deactivated zeolite crystal adsorbents., and . Comput. Chem. Eng., 27 (5): 689-696 (2003)Using Problem Posing, Problem Solving for Game-Based Learning in Remote Labs., , , , and . ICALT, page 716-717. IEEE Computer Society, (2012)