Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (3): 437-451 (2018)Computing with time: microarchitectural weird machines., , , , , and . ASPLOS, page 758-772. ACM, (2021)A co-processor approach for accelerating data-structure intensive algorithms., , , and . ICCD, page 431-438. IEEE Computer Society, (2010)Runtime Attestation for IAAS Clouds., , , , , , and . CLOSER, page 233-247. SciTePress, (2018)Rethinking Memory Permissions for Protection Against Cross-Layer Attacks., , , , and . ACM Trans. Archit. Code Optim., 12 (4): 56:1-56:27 (2016)Mathematical limits of parallel computation for embedded systems., , , and . ASP-DAC, page 653-660. IEEE, (2011)TPM-SIM: a framework for performance evaluation of trusted platform modules., , , , and . DAC, page 236-241. ACM, (2011)Generalized Insider Attack Detection Implementation using NetFlow Data., and . CoRR, (2020)ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System., , , , , and . CLOSER, page 191-200. SciTePress, (2017)A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks., , , and . HPCA, page 201-212. IEEE Computer Society, (2014)