Author of the publication

DOLMA: Securing Speculation with the Principle of Transient Non-Observability.

, , , , , , and . USENIX Security Symposium, page 1397-1414. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NDA: Preventing Speculative Execution Attacks at Their Source., , , , and . MICRO, page 572-586. ACM, (2019)Enabling Usable and Performant Trusted Execution.. University of Michigan, USA, (2019)A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks., , and . CHES, volume 8731 of Lecture Notes in Computer Science, page 17-34. Springer, (2014)Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow., , , , , , , , , and . IEEE Micro, 39 (3): 66-74 (2019)Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves., , and . ISCA, page 81-93. ACM, (2017)Practical template-algebraic side channel attacks with extremely low data complexity., , and . HASP@ISCA, page 7. ACM, (2013)DOLMA: Securing Speculation with the Principle of Transient Non-Observability., , , , , , and . USENIX Security Symposium, page 1397-1414. USENIX Association, (2021)ghOSt: Fast & Flexible User-Space Delegation of Linux Scheduling., , , , , , , , , and . SOSP, page 588-604. ACM, (2021)WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks., , , , and . EuroS&P, page 3-18. IEEE, (2017)